Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-4034 (GCVE-0-2021-4034)
Vulnerability from cvelistv5
- CWE-787 - (|CWE-125)
CISA Known Exploited Vulnerability
Data from the CISA Known Exploited Vulnerabilities Catalog
Date added: 2022-06-27
Due date: 2022-07-18
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-4034
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-09-23T18:05:54.355Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://www.vicarius.io/vsociety/posts/pwnkit-pkexec-lpe-cve-2021-4034"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.suse.com/support/kb/doc/?id=000020564"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.starwindsoftware.com/security/sw-20220818-0001/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/"
          }
        ],
        "title": "CVE Program Container",
        "x_generator": {
          "engine": "ADPogram 0.0.1"
        }
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-4034",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-12T10:21:57.857346Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2022-06-27",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-4034"
              },
              "type": "kev"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:15:48.549Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-4034"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2022-06-27T00:00:00+00:00",
            "value": "CVE-2021-4034 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "polkit",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "(CWE-787|CWE-125)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-18T00:16:44.133Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "url": "https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683"
        },
        {
          "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
        },
        {
          "url": "http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html"
        },
        {
          "url": "http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html"
        },
        {
          "url": "https://www.suse.com/support/kb/doc/?id=000020564"
        },
        {
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf"
        },
        {
          "url": "https://www.starwindsoftware.com/security/sw-20220818-0001/"
        },
        {
          "url": "https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2021-4034",
    "datePublished": "2022-01-28T00:00:00.000Z",
    "dateReserved": "2021-11-29T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:15:48.549Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "cisa_known_exploited": {
      "cveID": "CVE-2021-4034",
      "cwes": "[\"CWE-787\"]",
      "dateAdded": "2022-06-27",
      "dueDate": "2022-07-18",
      "knownRansomwareCampaignUse": "Unknown",
      "notes": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
      "product": "Polkit",
      "requiredAction": "Apply updates per vendor instructions.",
      "shortDescription": "The Red Hat polkit pkexec utility contains an out-of-bounds read and write vulnerability that allows for privilege escalation with administrative rights.",
      "vendorProject": "Red Hat",
      "vulnerabilityName": "Red Hat Polkit Out-of-Bounds Read and Write Vulnerability"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-4034\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2022-01-28T20:15:12.193\",\"lastModified\":\"2025-10-22T00:17:50.363\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una vulnerabilidad de escalada de privilegios local en la utilidad pkexec de polkit. La aplicaci\u00f3n pkexec es una herramienta setuid dise\u00f1ada para permitir a usuarios sin privilegios ejecutar comandos como usuarios privilegiados de acuerdo con pol\u00edticas predefinidas. La versi\u00f3n actual de pkexec no maneja correctamente el recuento de par\u00e1metros de llamada y termina intentando ejecutar variables de entorno como comandos. Un atacante puede aprovechar esto creando variables de entorno de tal manera que induzcan a pkexec a ejecutar c\u00f3digo arbitrario. Cuando se ejecuta con \u00e9xito, el ataque puede provocar una escalada de privilegios locales otorgando a los usuarios sin privilegios derechos administrativos en la m\u00e1quina de destino.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2022-06-27\",\"cisaActionDue\":\"2022-07-18\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Red Hat Polkit Out-of-Bounds Read and Write Vulnerability\",\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"},{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"121\",\"matchCriteriaId\":\"F01D94C9-1E04-413B-8636-1AAC6D9E84D6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB70A2F8-EAB3-4898-9353-F679FF721C82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB3AC848-C2D0-4878-8619-F5815173555D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831F0F47-3565-4763-B16F-C87B1FF2035E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"566507B6-AC95-47F7-A3FB-C6F414E45F51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87C21FE1-EA5C-498F-9C6C-D05F91A88217\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AB105EC-19F9-424A-86F1-305A6FD74A9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C9BD9AE-46FC-4609-8D99-A3CFE91D58D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CDCFF34-6F1D-45A1-BE37-6A0E17B04801\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A684C7-88FD-43C4-9BDB-AE337FCBD0AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47811209-5CE5-4375-8391-B0A7F6A0E420\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EB6F417-25D0-4A28-B7BA-D21929EAA9E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5C80DB2-4A78-4EC9-B2A8-1E4D902C4834\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"983533DD-3970-4A37-9A9C-582BD48AA1E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37CE1DC7-72C5-483C-8921-0B462C8284D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7431ABC1-9252-419E-8CC1-311B41360078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6897676D-53F9-45B3-B27F-7FF9A4C58D33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28F226A-CBC7-4A32-BE58-398FA5B42481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61917784-47F1-4328-BA1F-A88C5E23496B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F256A9-D3B9-4C72-B013-4EFD878BFEA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B09ACF2D-D83F-4A86-8185-9569605D8EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC10D919-57FD-4725-B8D2-39ECB476902F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48C2E003-A71C-4D06-B8B3-F93160568182\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3921C1CF-A16D-4727-99AD-03EFFA7C91CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC6DD887-9744-43EA-8B3C-44C6B6339590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"902B8056-9E37-443B-8905-8AA93E2447FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAE4D2D0-CEEB-416F-8BC5-A7987DF56190\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:enterprise_storage:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7305944-AC9C-47A3-AADF-71A8B24830D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:-:*:*:*\",\"matchCriteriaId\":\"CDFEA8DC-7D78-4ACD-A95C-9408F45EEAE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:manager_proxy:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9910C73A-3BCD-4F56-8C7D-79CB289640A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:manager_server:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5810E98-7BF5-42E2-9DE9-661049ABE367\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:15:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C4F62C0-4188-433A-8292-559025CA23C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:-:*:*\",\"matchCriteriaId\":\"07D416C5-4A0F-4EF3-A3DE-A028AAA4F739\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:sap:*:*\",\"matchCriteriaId\":\"F6C1736B-0505-4C19-98B7-90C8359F3BCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp5:*:*:*:*:*:*\",\"matchCriteriaId\":\"243B9B56-C744-4C1C-B42E-158C1B041B6A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFC79B17-E9D2-44D5-93ED-2F959E7A3D43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD04BEE5-E9A8-4584-A68C-0195CE9C402C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E503FB-6279-4D4A-91D8-E237ECF9D2B0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinumerik_edge:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.3.0\",\"matchCriteriaId\":\"D069EA07-88A5-4058-A2BC-44F94D9ACC9A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.0\",\"matchCriteriaId\":\"9FC41AD4-69E5-48D8-8216-671F485C3C40\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52A77C9D-E59C-4397-B834-797D7B334A6B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:starwindsoftware:command_center:1.0:update3_build5871:*:*:*:*:*:*\",\"matchCriteriaId\":\"B323EF31-7A67-4458-8323-86F8AA58268C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build14338:*:*:*:*:*:*\",\"matchCriteriaId\":\"14AF427F-BC75-40C7-9579-34A74E2E475D\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/RHSB-2022-001\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2025869\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.starwindsoftware.com/security/sw-20220818-0001/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.suse.com/support/kb/doc/?id=000020564\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/RHSB-2022-001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2025869\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.starwindsoftware.com/security/sw-20220818-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.suse.com/support/kb/doc/?id=000020564\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.vicarius.io/vsociety/posts/pwnkit-pkexec-lpe-cve-2021-4034\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-4034\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.vicarius.io/vsociety/posts/pwnkit-pkexec-lpe-cve-2021-4034\"}, {\"url\": \"https://access.redhat.com/security/vulnerabilities/RHSB-2022-001\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2025869\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2022.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.suse.com/support/kb/doc/?id=000020564\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.starwindsoftware.com/security/sw-20220818-0001/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/\", \"tags\": [\"x_transferred\"]}], \"x_generator\": {\"engine\": \"ADPogram 0.0.1\"}, \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-09-23T18:05:54.355Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-4034\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-04T14:58:14.217207Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2022-06-27\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-4034\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2022-06-27T00:00:00+00:00\", \"value\": \"CVE-2021-4034 added to CISA KEV\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-29T16:47:04.068Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"polkit\", \"versions\": [{\"status\": \"affected\", \"version\": \"all\"}]}], \"references\": [{\"url\": \"https://access.redhat.com/security/vulnerabilities/RHSB-2022-001\"}, {\"url\": \"https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2025869\"}, {\"url\": \"https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683\"}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2022.html\"}, {\"url\": \"http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html\"}, {\"url\": \"http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html\"}, {\"url\": \"https://www.suse.com/support/kb/doc/?id=000020564\"}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf\"}, {\"url\": \"https://www.starwindsoftware.com/security/sw-20220818-0001/\"}, {\"url\": \"https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"(CWE-787|CWE-125)\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2023-10-18T00:16:44.133Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-4034\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T18:46:04.094Z\", \"dateReserved\": \"2021-11-29T00:00:00.000Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2022-01-28T00:00:00.000Z\", \"assignerShortName\": \"redhat\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  CERTFR-2022-AVI-085
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans pkexec de PolicyKit sur Debian. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Debian bullseye (security) versions 11 sans le correctif 0.105-31+deb11u1
- Debian buster (security) versions 10 sans le correctif 0.105-25+deb10u1
- Debain stretch (security) versions 9 sans le correctif 0.105-18+deb9u2
- Debian sid version unstable sans le correctif 0.105-31.1
L'éditeur ne propose pas de correctif pour la version Debian 12 bookworm.
| Vendor | Product | Description | 
|---|
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cul\u003e \u003cli\u003eDebian bullseye (security) versions 11 sans le correctif 0.105-31+deb11u1\u003c/li\u003e \u003cli\u003eDebian buster (security) versions 10 sans le correctif 0.105-25+deb10u1\u003c/li\u003e \u003cli\u003eDebain stretch (security) versions 9 sans le correctif 0.105-18+deb9u2\u003c/li\u003e \u003cli\u003eDebian sid version unstable sans le correctif 0.105-31.1\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eL\u0027\u00e9diteur ne propose pas de correctif pour la version Debian 12 bookworm.\u003c/p\u003e ",
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    }
  ],
  "initial_release_date": "2022-01-27T00:00:00",
  "last_revision_date": "2022-01-27T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-085",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-01-27T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans pkexec de PolicyKit sur Debian.\nElle permet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans pkexec de PolicyKit sur Debian",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Debian dsa-5059 du 25 janvier 2022",
      "url": "https://www.debian.org/security/2022/dsa-5059"
    },
    {
      "published_at": null,
      "title": "Suivi s\u00e9curit\u00e9 Debian CVE-2021-4034 du 27 janvier 2022",
      "url": "https://security-tracker.debian.org/tracker/CVE-2021-4034"
    },
    {
      "published_at": null,
      "title": "Information Debian sur le paquet policykit-1 du 27 janvier 2022",
      "url": "https://security-tracker.debian.org/tracker/source-package/policykit-1"
    }
  ]
}
  CERTFR-2023-AVI-0220
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SINEC NMS | ||
| Siemens | N/A | De nombreuses références SCALANCE et SIPROTEC (se référer aux bulletins de sécurité de l'éditeur pour les versions affectées) | ||
| Siemens | N/A | RUGGEDCOM CROSSBOW versions antérieures à V5.3 | ||
| Siemens | N/A | Mendix SAML (Mendix 9 compatible, New Track) versions 3.1.9 à 3.2.x antérieures à V3.3.0 | ||
| Siemens | N/A | Mendix SAML (Mendix 7 compatible) versions antérieures à V1.17.3 | ||
| Siemens | N/A | Mendix SAML (Mendix 8 compatible) versions antérieures à V2.3.0 | ||
| Siemens | N/A | SINEMA Server V14 | ||
| Siemens | N/A | Mendix SAML (Mendix 9 compatible, Upgrade Track) versions 3.1.9 à 3.2.x antérieures à V3.3.0 | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) et NAM (6GK6108-4AM00-2DA2) versions antérieures à V7.2 | 
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SINEC NMS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "De nombreuses r\u00e9f\u00e9rences SCALANCE et SIPROTEC (se r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour les versions affect\u00e9es)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM CROSSBOW versions ant\u00e9rieures \u00e0 V5.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix SAML (Mendix 9 compatible, New Track) versions 3.1.9 \u00e0 3.2.x ant\u00e9rieures \u00e0 V3.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix SAML (Mendix 7 compatible) versions ant\u00e9rieures \u00e0 V1.17.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix SAML (Mendix 8 compatible) versions ant\u00e9rieures \u00e0 V2.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEMA Server V14",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix SAML (Mendix 9 compatible, Upgrade Track) versions 3.1.9 \u00e0 3.2.x ant\u00e9rieures \u00e0 V3.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) et NAM (6GK6108-4AM00-2DA2) versions ant\u00e9rieures \u00e0 V7.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-1343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
    },
    {
      "name": "CVE-2019-1125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1125"
    },
    {
      "name": "CVE-2021-42384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
    },
    {
      "name": "CVE-2022-35252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
    },
    {
      "name": "CVE-2022-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
    },
    {
      "name": "CVE-2021-42378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
    },
    {
      "name": "CVE-2022-30594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
    },
    {
      "name": "CVE-2021-42382",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
    },
    {
      "name": "CVE-2021-42376",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
    },
    {
      "name": "CVE-2022-24282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24282"
    },
    {
      "name": "CVE-2019-1071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1071"
    },
    {
      "name": "CVE-2022-28356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28356"
    },
    {
      "name": "CVE-2022-4304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
    },
    {
      "name": "CVE-2018-12886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12886"
    },
    {
      "name": "CVE-2022-32208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
    },
    {
      "name": "CVE-2022-32296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
    },
    {
      "name": "CVE-2022-2380",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2380"
    },
    {
      "name": "CVE-2021-42373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42373"
    },
    {
      "name": "CVE-2022-1292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
    },
    {
      "name": "CVE-2021-42377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42377"
    },
    {
      "name": "CVE-2022-1652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
    },
    {
      "name": "CVE-2022-24281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24281"
    },
    {
      "name": "CVE-2022-23037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23037"
    },
    {
      "name": "CVE-2022-32207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
    },
    {
      "name": "CVE-2022-23395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23395"
    },
    {
      "name": "CVE-2023-0215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
    },
    {
      "name": "CVE-2022-23042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23042"
    },
    {
      "name": "CVE-2023-25957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25957"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2021-42386",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
    },
    {
      "name": "CVE-2022-2639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
    },
    {
      "name": "CVE-2021-42380",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42380"
    },
    {
      "name": "CVE-2022-38767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38767"
    },
    {
      "name": "CVE-2021-42374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
    },
    {
      "name": "CVE-2022-23036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23036"
    },
    {
      "name": "CVE-2022-0002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
    },
    {
      "name": "CVE-2023-27462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27462"
    },
    {
      "name": "CVE-2022-1016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
    },
    {
      "name": "CVE-2022-1975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
    },
    {
      "name": "CVE-2022-23038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23038"
    },
    {
      "name": "CVE-2023-27309",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27309"
    },
    {
      "name": "CVE-2018-25032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
    },
    {
      "name": "CVE-2022-0494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0494"
    },
    {
      "name": "CVE-2021-42379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
    },
    {
      "name": "CVE-2022-23039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23039"
    },
    {
      "name": "CVE-2021-42381",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
    },
    {
      "name": "CVE-2022-23040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23040"
    },
    {
      "name": "CVE-2022-1304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
    },
    {
      "name": "CVE-2022-1011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
    },
    {
      "name": "CVE-2021-26401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
    },
    {
      "name": "CVE-2022-0547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0547"
    },
    {
      "name": "CVE-2021-42383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42383"
    },
    {
      "name": "CVE-2022-23041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23041"
    },
    {
      "name": "CVE-2022-1734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1734"
    },
    {
      "name": "CVE-2022-4450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
    },
    {
      "name": "CVE-2022-32205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
    },
    {
      "name": "CVE-2022-32981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32981"
    },
    {
      "name": "CVE-2022-26490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26490"
    },
    {
      "name": "CVE-2022-36946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
    },
    {
      "name": "CVE-2022-0001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
    },
    {
      "name": "CVE-2021-42385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
    },
    {
      "name": "CVE-2022-23308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
    },
    {
      "name": "CVE-2022-36879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
    },
    {
      "name": "CVE-2022-1353",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1353"
    },
    {
      "name": "CVE-2022-2588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
    },
    {
      "name": "CVE-2019-1073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1073"
    },
    {
      "name": "CVE-2022-32206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
    },
    {
      "name": "CVE-2022-1729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
    },
    {
      "name": "CVE-2021-4149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4149"
    },
    {
      "name": "CVE-2017-5715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
    },
    {
      "name": "CVE-2022-1199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1199"
    },
    {
      "name": "CVE-2021-42375",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42375"
    },
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    },
    {
      "name": "CVE-2022-28390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28390"
    },
    {
      "name": "CVE-2022-33981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
    },
    {
      "name": "CVE-2022-1974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
    },
    {
      "name": "CVE-2023-27310",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27310"
    },
    {
      "name": "CVE-2022-30065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30065"
    },
    {
      "name": "CVE-2022-25311",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25311"
    },
    {
      "name": "CVE-2022-1516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1516"
    },
    {
      "name": "CVE-2023-27463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27463"
    },
    {
      "name": "CVE-2022-1198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1198"
    },
    {
      "name": "CVE-2022-20158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20158"
    }
  ],
  "initial_release_date": "2023-03-14T00:00:00",
  "last_revision_date": "2023-03-14T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0220",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-03-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-419740 du 14 mars 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-419740.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-320629 du 14 mars 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-320629.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-250085 du 14 mars 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-250085.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-203374 du 14 mars 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-203374.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-851884 du 14 mars 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-851884.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-565386 du 14 mars 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-565386.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-260625 du 14 mars 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-260625.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-726834 du 14 mars 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-726834.html"
    }
  ]
}
  CERTFR-2022-AVI-916
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Contrail Networking versions antérieures à R22.3 | ||
| Juniper Networks | N/A | Paragon Active Assurance (anciennement Netrounds) versions antérieures à 3.1.1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.2R1 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 20.4R3-S4-EVO, 21.2R2-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S3-EVO, 21.1R2-EVO, 21.2R1-EVO, 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S3-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S4-EVO, 21.1R3-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.2R3-S3-EVO, 20.4R3-S1-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO et 22.1R1-EVO | ||
| Juniper Networks | N/A | Contrail Networking versions antérieures à 2011.L5 | ||
| Juniper Networks | N/A | Steel Belted Radius Carrier Edition versions antérieures à 8.6.0R16 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R2, 21.2R2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S5, 19.3R3-S3, 19.4R3-S9, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, 15.1R7-S11, 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R3-S4, 19.3R3-S5, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S3, 20.3R3-S2, 20.4R3-S4, 21.1R3, 21.2R3-S3, 21.3R3-S1, 21.4R1, 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.2R3-S5, 20.3R3-S5, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R2, 21.4R1, 18.4R2-S10, 18.4R3-S10, 19.1R3-S7, 19.2R1-S8, 19.2R3-S4, 19.4R3-S8, 20.2R3-S3, 20.3R3-S2, 20.4R3, 21.1R2, 21.2R1, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R1-S1, 22.2R2, 22.3R1, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R2, 22.3R1, 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R2, 22.1R2, 22.2R1, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R2, 22.1R1, 19.2R3-S5, 19.3R3-S5, 19.4R2-S6, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S1, 21.4R2, 22.1R1, 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, 21.4R1-S2, 21.4R2, 22.1R1, 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1, 18.4R2-S9, 18.4R3-S11, 19.1R3-S8, 19.3R3-S5, 19.4R2-S6, 19.4R3-S6, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3-S3, 21.2R2-S1, 21.2R3, 21.3R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, 19.4R3-S8, 20.1R3-S2, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R3, 21.3R2, 21.4R1, 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 21.4R3, 22.1R1-S1, 22.1R2 et 22.2R1 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions antérieures à 5.4.7 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions 5.5.x antérieures à 5.5.3 | ||
| Juniper Networks | N/A | Paragon Active Assurance (anciennement Netrounds) versions 3.2.x antérieures à 3.2.1 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Paragon Active Assurance (anciennement Netrounds) versions ant\u00e9rieures \u00e0 3.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space versions ant\u00e9rieures \u00e0 22.2R1",
      "product": {
        "name": "Junos Space",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S4-EVO, 21.2R2-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S3-EVO, 21.1R2-EVO, 21.2R1-EVO, 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S3-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S4-EVO, 21.1R3-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.2R3-S3-EVO, 20.4R3-S1-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO et 22.1R1-EVO",
      "product": {
        "name": "Junos OS Evolved",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Contrail Networking versions ant\u00e9rieures \u00e0 2011.L5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Steel Belted Radius Carrier Edition versions ant\u00e9rieures \u00e0 8.6.0R16",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R2, 21.2R2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S5, 19.3R3-S3, 19.4R3-S9, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, 15.1R7-S11, 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R3-S4, 19.3R3-S5, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S3, 20.3R3-S2, 20.4R3-S4, 21.1R3, 21.2R3-S3, 21.3R3-S1, 21.4R1, 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.2R3-S5, 20.3R3-S5, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R2, 21.4R1, 18.4R2-S10, 18.4R3-S10, 19.1R3-S7, 19.2R1-S8, 19.2R3-S4, 19.4R3-S8, 20.2R3-S3, 20.3R3-S2, 20.4R3, 21.1R2, 21.2R1, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R1-S1, 22.2R2, 22.3R1, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R2, 22.3R1, 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R2, 22.1R2, 22.2R1, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R2, 22.1R1, 19.2R3-S5, 19.3R3-S5, 19.4R2-S6, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S1, 21.4R2, 22.1R1, 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, 21.4R1-S2, 21.4R2, 22.1R1, 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1, 18.4R2-S9, 18.4R3-S11, 19.1R3-S8, 19.3R3-S5, 19.4R2-S6, 19.4R3-S6, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3-S3, 21.2R2-S1, 21.2R3, 21.3R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, 19.4R3-S8, 20.1R3-S2, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R3, 21.3R2, 21.4R1, 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 21.4R3, 22.1R1-S1, 22.1R2 et 22.2R1",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Session Smart Router versions ant\u00e9rieures \u00e0 5.4.7",
      "product": {
        "name": "Session Smart Router",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Session Smart Router versions 5.5.x ant\u00e9rieures \u00e0 5.5.3",
      "product": {
        "name": "Session Smart Router",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Paragon Active Assurance (anciennement Netrounds) versions 3.2.x ant\u00e9rieures \u00e0 3.2.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-1343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
    },
    {
      "name": "CVE-2022-22243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22243"
    },
    {
      "name": "CVE-2022-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
    },
    {
      "name": "CVE-2020-25710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25710"
    },
    {
      "name": "CVE-2021-45960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
    },
    {
      "name": "CVE-2022-24407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
    },
    {
      "name": "CVE-2021-35586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
    },
    {
      "name": "CVE-2022-22238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22238"
    },
    {
      "name": "CVE-2022-22249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22249"
    },
    {
      "name": "CVE-2021-35550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
    },
    {
      "name": "CVE-2022-22227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22227"
    },
    {
      "name": "CVE-2016-0701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0701"
    },
    {
      "name": "CVE-2021-25220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
    },
    {
      "name": "CVE-2021-35567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
    },
    {
      "name": "CVE-2021-31535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
    },
    {
      "name": "CVE-2021-42574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
    },
    {
      "name": "CVE-2020-27777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
    },
    {
      "name": "CVE-2022-22208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22208"
    },
    {
      "name": "CVE-2022-1292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
    },
    {
      "name": "CVE-2017-5929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5929"
    },
    {
      "name": "CVE-2022-22218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22218"
    },
    {
      "name": "CVE-2021-20271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
    },
    {
      "name": "CVE-2022-22823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
    },
    {
      "name": "CVE-2022-22201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22201"
    },
    {
      "name": "CVE-2020-0466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
    },
    {
      "name": "CVE-2021-42771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
    },
    {
      "name": "CVE-2021-29154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
    },
    {
      "name": "CVE-2018-20532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20532"
    },
    {
      "name": "CVE-2022-22246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22246"
    },
    {
      "name": "CVE-2007-6755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
    },
    {
      "name": "CVE-2020-29661",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29661"
    },
    {
      "name": "CVE-2022-22250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22250"
    },
    {
      "name": "CVE-2022-22192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22192"
    },
    {
      "name": "CVE-2019-12735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
    },
    {
      "name": "CVE-2022-22239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22239"
    },
    {
      "name": "CVE-2022-25315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
    },
    {
      "name": "CVE-2022-22822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
    },
    {
      "name": "CVE-2022-22241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22241"
    },
    {
      "name": "CVE-2020-25212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
    },
    {
      "name": "CVE-2019-2435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2435"
    },
    {
      "name": "CVE-2021-27363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
    },
    {
      "name": "CVE-2022-22226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22226"
    },
    {
      "name": "CVE-2015-9262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
    },
    {
      "name": "CVE-2021-4160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
    },
    {
      "name": "CVE-2020-24394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
    },
    {
      "name": "CVE-2021-35559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
    },
    {
      "name": "CVE-2021-3573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
    },
    {
      "name": "CVE-2019-19532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
    },
    {
      "name": "CVE-2020-14314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
    },
    {
      "name": "CVE-2021-27364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
    },
    {
      "name": "CVE-2021-35565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
    },
    {
      "name": "CVE-2022-22229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22229"
    },
    {
      "name": "CVE-2018-20534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20534"
    },
    {
      "name": "CVE-2016-4658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
    },
    {
      "name": "CVE-2021-35603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
    },
    {
      "name": "CVE-2021-28165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
    },
    {
      "name": "CVE-2022-23852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
    },
    {
      "name": "CVE-2022-22225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22225"
    },
    {
      "name": "CVE-2020-12364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
    },
    {
      "name": "CVE-2022-22825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
    },
    {
      "name": "CVE-2021-3711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
    },
    {
      "name": "CVE-2022-22245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22245"
    },
    {
      "name": "CVE-2022-25314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25314"
    },
    {
      "name": "CVE-2022-0330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
    },
    {
      "name": "CVE-2022-23990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
    },
    {
      "name": "CVE-2019-1543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
    },
    {
      "name": "CVE-2018-10689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-10689"
    },
    {
      "name": "CVE-2016-2124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2124"
    },
    {
      "name": "CVE-2021-27365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2022-25235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
    },
    {
      "name": "CVE-2020-27170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
    },
    {
      "name": "CVE-2020-25705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25705"
    },
    {
      "name": "CVE-2018-25032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
    },
    {
      "name": "CVE-2022-0847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
    },
    {
      "name": "CVE-2020-14385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
    },
    {
      "name": "CVE-2022-22232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22232"
    },
    {
      "name": "CVE-2019-18282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
    },
    {
      "name": "CVE-2020-12321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12321"
    },
    {
      "name": "CVE-2022-22240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22240"
    },
    {
      "name": "CVE-2021-46143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
    },
    {
      "name": "CVE-2019-20811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
    },
    {
      "name": "CVE-2020-12363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
    },
    {
      "name": "CVE-2021-43527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
    },
    {
      "name": "CVE-2022-22942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
    },
    {
      "name": "CVE-2021-3656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
    },
    {
      "name": "CVE-2021-35588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
    },
    {
      "name": "CVE-2022-22234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22234"
    },
    {
      "name": "CVE-2022-22242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22242"
    },
    {
      "name": "CVE-2022-1271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2022-22251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22251"
    },
    {
      "name": "CVE-2008-5161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
    },
    {
      "name": "CVE-2022-22244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22244"
    },
    {
      "name": "CVE-2019-20934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
    },
    {
      "name": "CVE-2021-29650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
    },
    {
      "name": "CVE-2021-3715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
    },
    {
      "name": "CVE-2022-22233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22233"
    },
    {
      "name": "CVE-2021-4155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
    },
    {
      "name": "CVE-2021-45417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45417"
    },
    {
      "name": "CVE-2020-10769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
    },
    {
      "name": "CVE-2018-20533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20533"
    },
    {
      "name": "CVE-2021-3564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
    },
    {
      "name": "CVE-2020-25656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25656"
    },
    {
      "name": "CVE-2021-3752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
    },
    {
      "name": "CVE-2022-22224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22224"
    },
    {
      "name": "CVE-2021-20265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20265"
    },
    {
      "name": "CVE-2021-3177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
    },
    {
      "name": "CVE-2020-25211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25211"
    },
    {
      "name": "CVE-2022-0492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
    },
    {
      "name": "CVE-2022-22827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
    },
    {
      "name": "CVE-2022-22247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22247"
    },
    {
      "name": "CVE-2020-12362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
    },
    {
      "name": "CVE-2019-0205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0205"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    },
    {
      "name": "CVE-2021-3347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
    },
    {
      "name": "CVE-2022-25236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
    },
    {
      "name": "CVE-2022-0778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-35578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
    },
    {
      "name": "CVE-2020-28374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28374"
    },
    {
      "name": "CVE-2021-0920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
    },
    {
      "name": "CVE-2022-22199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22199"
    },
    {
      "name": "CVE-2021-42550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42550"
    },
    {
      "name": "CVE-2021-3712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
    },
    {
      "name": "CVE-2022-22236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22236"
    },
    {
      "name": "CVE-2020-7053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7053"
    },
    {
      "name": "CVE-2022-22248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22248"
    },
    {
      "name": "CVE-2019-9518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518"
    },
    {
      "name": "CVE-2022-22220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22220"
    },
    {
      "name": "CVE-2021-32399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
    },
    {
      "name": "CVE-2021-35564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
    },
    {
      "name": "CVE-2022-22826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
    },
    {
      "name": "CVE-2022-22228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22228"
    },
    {
      "name": "CVE-2021-23840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
    },
    {
      "name": "CVE-2020-14351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14351"
    },
    {
      "name": "CVE-2020-25709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25709"
    },
    {
      "name": "CVE-2022-1434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
    },
    {
      "name": "CVE-2020-25643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
    },
    {
      "name": "CVE-2022-22223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22223"
    },
    {
      "name": "CVE-2020-25645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25645"
    },
    {
      "name": "CVE-2021-35556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
    },
    {
      "name": "CVE-2020-25717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25717"
    },
    {
      "name": "CVE-2021-3765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
    },
    {
      "name": "CVE-2021-41617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
    },
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    },
    {
      "name": "CVE-2022-24903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
    },
    {
      "name": "CVE-2022-22824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
    },
    {
      "name": "CVE-2019-1551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
    },
    {
      "name": "CVE-2019-2684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2684"
    },
    {
      "name": "CVE-2021-0543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0543"
    },
    {
      "name": "CVE-2021-3653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
    },
    {
      "name": "CVE-2022-22231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22231"
    },
    {
      "name": "CVE-2021-35561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
    },
    {
      "name": "CVE-2022-22235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22235"
    },
    {
      "name": "CVE-2020-0427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
    },
    {
      "name": "CVE-2020-28469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
    },
    {
      "name": "CVE-2022-22211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22211"
    },
    {
      "name": "CVE-2020-0465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
    },
    {
      "name": "CVE-2022-22230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22230"
    },
    {
      "name": "CVE-2022-22237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22237"
    },
    {
      "name": "CVE-2021-37750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
    }
  ],
  "initial_release_date": "2022-10-13T00:00:00",
  "last_revision_date": "2022-10-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-916",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-10-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
  "vendor_advisories": [
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69906",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-MX-Series-An-FPC-crash-might-be-seen-due-to-mac-moves-within-the-same-bridge-domain-CVE-2022-22249"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69885",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-If-UTM-Enhanced-Content-Filtering-and-AntiVirus-are-enabled-and-specific-traffic-is-processed-the-PFE-will-crash-CVE-2022-22231"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69888",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69886",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-If-Unified-Threat-Management-UTM-Enhanced-Content-Filtering-CF-is-enabled-and-specific-traffic-is-processed-the-PFE-will-crash-CVE-2022-22232"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69899",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Multiple-vulnerabilities-in-J-Web"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69881",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-SBR-Carrier-Multiple-Vulnerabilities-resolved-in-version-8-6-0R16-64-bit-Solaris-and-Linux-editions"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69894",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-rpd-process-will-crash-when-a-malformed-incoming-RESV-message-is-processed-CVE-2022-22238"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69898",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-core-upon-receipt-of-a-specific-EVPN-route-by-a-BGP-route-reflector-in-an-EVPN-environment-CVE-2022-22199"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69895",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-The-ssh-CLI-command-always-runs-as-root-which-can-lead-to-privilege-escalation-CVE-2022-22239"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69908",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-cSRX-Series-Storing-Passwords-in-a-Recoverable-Format-and-software-permissions-issues-allows-a-local-attacker-to-elevate-privileges-CVE-2022-22251"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69874",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PPMD-goes-into-infinite-loop-upon-receipt-of-malformed-OSPF-TLV-CVE-2022-22224"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69902",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Due-to-a-race-condition-the-rpd-process-can-crash-upon-receipt-of-a-BGP-update-message-containing-flow-spec-route-CVE-2022-22220"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69879",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-crash-can-occur-due-to-memory-corruption-caused-by-flapping-BGP-sessions-CVE-2022-22208"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69890",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-EX2300-and-EX3400-Series-One-of-more-SFPs-might-become-unavailable-when-the-system-is-very-busy-CVE-2022-22234"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69875",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-BGP-multipath-scenario-when-one-of-the-contributing-routes-is-flapping-often-and-rapidly-rpd-may-crash-CVE-2022-22225"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69915",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-An-attacker-can-cause-a-kernel-panic-by-sending-a-malformed-TCP-packet-to-the-device-CVE-2022-22192"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69878",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Specific-IPv6-transit-traffic-gets-exceptioned-to-the-routing-engine-which-will-cause-increased-CPU-utilization-CVE-2022-22227"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69907",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-FPC-might-crash-and-reload-if-the-EVPN-MAC-entry-is-move-from-local-to-remote-CVE-2022-22250"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69891",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-A-flowd-core-will-be-observed-when-malformed-GPRS-traffic-is-processed-CVE-2022-22235"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69882",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69876",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-EX4300-MP-EX4600-QFX5000-Series-In-VxLAN-scenarios-specific-packets-processed-cause-a-memory-leak-leading-to-a-PFE-crash-CVE-2022-22226"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69892",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-When-specific-valid-SIP-packets-are-received-the-PFE-will-crash-CVE-2022-22236"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69889",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69887",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-SR-to-LDP-interworking-scenario-with-SRMS-when-a-specific-low-privileged-command-is-issued-on-an-ABR-rpd-will-crash-CVE-2022-22233"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69900",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX5000-Series-with-SPC3-SRX4000-Series-and-vSRX-When-PowerMode-IPsec-is-configured-the-PFE-will-crash-upon-receipt-of-a-malformed-ESP-packet-CVE-2022-22201"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69884",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-specific-OSPFv3-LSAs-CVE-2022-22230"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69901",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Upon-processing-of-a-genuine-packet-the-pkid-process-will-crash-during-CMPv2-auto-re-enrollment-CVE-2022-22218"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69905",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-Incorrect-file-permissions-can-allow-low-privileged-user-to-cause-another-user-to-execute-arbitrary-commands-CVE-2022-22248"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69893",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Peers-not-configured-for-TCP-AO-can-establish-a-BGP-or-LDP-session-even-if-authentication-is-configured-locally-CVE-2022-22237"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69904",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-Kernel-processing-of-unvalidated-TCP-segments-could-lead-to-a-Denial-of-Service-DoS-CVE-2022-22247"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69880",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-On-IPv6-OAM-SRv6-network-enabled-devices-an-attacker-sending-a-specific-genuine-packet-to-an-IPv6-address-configured-on-the-device-may-cause-a-RPD-memory-leak-leading-to-an-RPD-core-CVE-2022-22228"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69873",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-QFX10000-Series-In-IP-MPLS-PHP-node-scenarios-upon-receipt-of-certain-crafted-packets-multiple-interfaces-in-LAG-configurations-may-detach-CVE-2022-22223"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69896",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-memory-leak-might-be-observed-while-running-a-specific-cli-command-in-a-RIB-sharding-scenario-CVE-2022-22240"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69897",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-release-2011-L5"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69916",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-Multiple-FPCs-become-unreachable-due-to-continuous-polling-of-specific-SNMP-OID-CVE-2022-22211"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69883",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Paragon-Active-Assurance-Formerly-Netrounds-Stored-Cross-site-Scripting-XSS-vulnerability-in-web-administration-CVE-2022-22229"
    }
  ]
}
  CERTFR-2022-AVI-351
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les logiciels Juniper . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Contrail Networking versions antérieures à 2011.L4 et 21.3 | ||
| Juniper Networks | N/A | JIMS versions antérieures à 1.4.0 | ||
| Juniper Networks | N/A | Paragon Active Assurance versions 3.3.x | ||
| Juniper Networks | Secure Analytics | Secure Analytics versions 7.4.x anttérieures à 7.4.2 FixPack 2 | ||
| Juniper Networks | Secure Analytics | Secure Analytics versions 7.3.x antérieures à 7.3.3 FixPack 7 | ||
| Juniper Networks | N/A | Paragon Active Assurance versions 3.1.x | ||
| Juniper Networks | N/A | Contrail Service Orchestration versions 6.0.x antérieures à 6.0.0 Patch v3 | ||
| Juniper Networks | N/A | Paragon Active Assurance versions 3.2.x | 
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Contrail Networking versions ant\u00e9rieures \u00e0 2011.L4 et 21.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "JIMS versions ant\u00e9rieures \u00e0 1.4.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Paragon Active Assurance versions 3.3.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Secure Analytics versions 7.4.x antt\u00e9rieures \u00e0 7.4.2 FixPack 2",
      "product": {
        "name": "Secure Analytics",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Secure Analytics versions 7.3.x ant\u00e9rieures \u00e0 7.3.3 FixPack 7",
      "product": {
        "name": "Secure Analytics",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Paragon Active Assurance versions 3.1.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Contrail Service Orchestration versions 6.0.x ant\u00e9rieures \u00e0 6.0.0 Patch v3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Paragon Active Assurance versions 3.2.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-1352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1352"
    },
    {
      "name": "CVE-2021-3517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
    },
    {
      "name": "CVE-2021-26691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
    },
    {
      "name": "CVE-2021-34552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34552"
    },
    {
      "name": "CVE-2020-7774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7774"
    },
    {
      "name": "CVE-2019-1349",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1349"
    },
    {
      "name": "CVE-2021-25289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25289"
    },
    {
      "name": "CVE-2019-1354",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1354"
    },
    {
      "name": "CVE-2021-3560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3560"
    },
    {
      "name": "CVE-2015-8315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-8315"
    },
    {
      "name": "CVE-2021-23017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
    },
    {
      "name": "CVE-2018-1000654",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000654"
    },
    {
      "name": "CVE-2022-22190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22190"
    },
    {
      "name": "CVE-2019-1350",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1350"
    },
    {
      "name": "CVE-2021-31597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31597"
    },
    {
      "name": "CVE-2014-9471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-9471"
    },
    {
      "name": "CVE-2022-22189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22189"
    },
    {
      "name": "CVE-2015-8391",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
    },
    {
      "name": "CVE-2021-3156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
    },
    {
      "name": "CVE-2019-1387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1387"
    },
    {
      "name": "CVE-2020-35654",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35654"
    },
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    },
    {
      "name": "CVE-2022-22187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22187"
    }
  ],
  "initial_release_date": "2022-04-15T00:00:00",
  "last_revision_date": "2022-04-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-351",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-04-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les logiciels\nJuniper . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les logiciels Juniper",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69504 du 13 avril 2022",
      "url": "https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Juniper-Secure-Analytics-JSA-Series-Heap-Based-Buffer-Overflow-in-Sudo-CVE-2021-3156?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69495 du 13 avril 2022",
      "url": "https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-JIMS-Local-Privilege-Escalation-vulnerability-via-repair-functionality-CVE-2022-22187?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69506 du 13 avril 2022",
      "url": "https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Paragon-Active-Assurance-Local-Privilege-Escalation-in-polkits-pkexec-CVE-2021-4034?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69498 du 13 avril 2022",
      "url": "https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Contrail-Service-Orchestration-An-authenticated-local-user-may-have-their-permissions-elevated-via-the-device-via-management-interface-without-authentication-CVE-2022-22189?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69507 du 13 avril 2022",
      "url": "https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Contrail-Networking-Multiple-vulnerabilities-resolved-in-Contrail-Networking-21-3-CVE-yyyy-nnnn?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69500 du 13 avril 2022",
      "url": "https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Paragon-Active-Assurance-Control-Center-Information-disclosure-vulnerability-in-crafted-URL-CVE-2022-22190?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69510 du 13 avril 2022",
      "url": "https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-release-2011-L4?language=en_US"
    }
  ]
}
  CERTFR-2022-AVI-086
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans pkexec de PolicyKit sur SUSE. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE OpenStack Cloud Crowbar versions 8 sans le correctif SUSE-OpenStack-Cloud-Crowbar-8-2022-189 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing versions 15 SP1-ESPOS sans le correctif SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-191 | ||
| SUSE | N/A | SUSE OpenStack Cloud versions 8 sans le correctif SUSE-OpenStack-Cloud-8-2022-189 | ||
| SUSE | N/A | SUSE OpenStack Cloud versions 9 sans le correctif SUSE-OpenStack-Cloud-9-2022-189 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server versions 4.1 sans le correctif SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-190 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server versions 15 SP1-LTSS sans le correctif SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-191 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server versions 15-LTSS sans le correctif SUSE-SLE-Product-SLES-15-2022-191 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing versions 15 SP1-LTSS sans le correctif SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-191 | ||
| SUSE | N/A | SUSE Enterprise Storage versions 7 sans le correctif SUSE-Storage-7-2022-190 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server versions 12 SP5 sans le correctif SUSE-SLE-SERVER-12-SP5-2022-189 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server versions 12 SP3-LTSS sans le correctif SUSE-SLE-SERVER-12-SP3-2022-189 | ||
| SUSE | N/A | SUSE CaaS Platform versions 4.0 sans le correctif SUSE-SUSE-CAASP-4.0-2022-191 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro versions 5.0 sans le correctif SUSE-SUSE-MicroOS-5.0-2022-190 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications versions 15 SP1 sans le correctif SUSE-SLE-Product-SLES_SAP-15-SP1-2022-191 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing versions 15-LTSS sans le correctif SUSE-SLE-Product-HPC-15-2022-191 | ||
| SUSE | N/A | HPE Helion Openstack versions 8 sans le correctif HPE-Helion-OpenStack-8-2022-189 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing versions 15 SP2-ESPOS sans le correctif SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-190 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server versions 15 SP2-LTSS sans le correctif SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-190 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications versions 12 SP5 sans le correctif SUSE-SLE-SERVER-12-SP5-2022-189 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications versions 12 SP4 sans le correctif SUSE-SLE-SAP-12-SP4-2022-189 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server versions 12 SP3-BCL sans le correctif SUSE-SLE-SERVER-12-SP3-BCL-2022-189 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing versions 15 SP2-LTSS sans le correctif SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-190 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server versions 4.1 sans le correctif SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-190 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing versions 15-ESPOS sans le correctif SUSE-SLE-Product-HPC-15-2022-191 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server versions 12 SP4-ESPOS sans le correctif SUSE-SLE-SERVER-12-SP4-ESPOS-2022-189 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server versions 12 SP2-BCL sans le correctif SUSE-SLE-SERVER-12-SP2-BCL-2022-189 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem versions 15 SP3 sans le correctif SUSE-SLE-Module-Basesystem-15-SP3-2022-190 | ||
| SUSE | N/A | SUSE Enterprise Storage versions 6 sans le correctif SUSE-Storage-6-2022-191 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server versions 15 SP1-BCL sans le correctif SUSE-SLE-Product-SLES-15-SP1-BCL-2022-191 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit versions 12 SP5 sans le correctif SUSE-SLE-SDK-12-SP5-2022-189 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server versions 12 SP3-ESPOS sans le correctif SUSE-SLE-SERVER-12-SP3-ESPOS-2022-189 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy versions 4.1 sans le correctif SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-190 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server versions 15 SP2-BCL sans le correctif SUSE-SLE-Product-SLES-15-SP2-BCL-2022-190 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension versions 12 SP5 sans le correctif SUSE-SLE-WE-12-SP5-2022-189 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro versions 5.1 sans le correctif SUSE-SUSE-MicroOS-5.1-2022-190 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar versions 9 sans le correctif SUSE-OpenStack-Cloud-Crowbar-9-2022-189 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications versions 12 SP3 sans le correctif SUSE-SLE-SAP-12-SP3-2022-189 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server versions 12 SP4-LTSS sans le correctif SUSE-SLE-SERVER-12-SP4-LTSS-2022-189 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications versions 15 sans le correctif SUSE-SLE-Product-SLES_SAP-15-2022-191 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications versions 15 SP2 sans le correctif SUSE-SLE-Product-SLES_SAP-15-SP2-2022-190 | ||
| SUSE | openSUSE Leap | openSUSE Leap versions 15.3 sans le correctif openSUSE-SLE-15.3-2022-190 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE OpenStack Cloud Crowbar versions 8 sans le correctif SUSE-OpenStack-Cloud-Crowbar-8-2022-189",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing versions 15 SP1-ESPOS sans le correctif SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-191",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE OpenStack Cloud versions 8 sans le correctif SUSE-OpenStack-Cloud-8-2022-189",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE OpenStack Cloud versions 9 sans le correctif SUSE-OpenStack-Cloud-9-2022-189",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Retail Branch Server versions 4.1 sans le correctif SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-190",
      "product": {
        "name": "SUSE Manager Retail Branch Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server versions 15 SP1-LTSS sans le correctif SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-191",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server versions 15-LTSS sans le correctif SUSE-SLE-Product-SLES-15-2022-191",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing versions 15 SP1-LTSS sans le correctif SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-191",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Enterprise Storage versions 7 sans le correctif SUSE-Storage-7-2022-190",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server versions 12 SP5 sans le correctif SUSE-SLE-SERVER-12-SP5-2022-189",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server versions 12 SP3-LTSS sans le correctif SUSE-SLE-SERVER-12-SP3-2022-189",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE CaaS Platform versions 4.0 sans le correctif SUSE-SUSE-CAASP-4.0-2022-191",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro versions 5.0 sans le correctif SUSE-SUSE-MicroOS-5.0-2022-190",
      "product": {
        "name": "SUSE Linux Enterprise Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications versions 15 SP1 sans le correctif SUSE-SLE-Product-SLES_SAP-15-SP1-2022-191",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing versions 15-LTSS sans le correctif SUSE-SLE-Product-HPC-15-2022-191",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "HPE Helion Openstack versions 8 sans le correctif HPE-Helion-OpenStack-8-2022-189",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing versions 15 SP2-ESPOS sans le correctif SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-190",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server versions 15 SP2-LTSS sans le correctif SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-190",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications versions 12 SP5 sans le correctif SUSE-SLE-SERVER-12-SP5-2022-189",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications versions 12 SP4 sans le correctif SUSE-SLE-SAP-12-SP4-2022-189",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server versions 12 SP3-BCL sans le correctif SUSE-SLE-SERVER-12-SP3-BCL-2022-189",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing versions 15 SP2-LTSS sans le correctif SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-190",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Server versions 4.1 sans le correctif SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-190",
      "product": {
        "name": "SUSE Manager Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Performance Computing versions 15-ESPOS sans le correctif SUSE-SLE-Product-HPC-15-2022-191",
      "product": {
        "name": "SUSE Linux Enterprise High Performance Computing",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server versions 12 SP4-ESPOS sans le correctif SUSE-SLE-SERVER-12-SP4-ESPOS-2022-189",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server versions 12 SP2-BCL sans le correctif SUSE-SLE-SERVER-12-SP2-BCL-2022-189",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Basesystem versions 15 SP3 sans le correctif SUSE-SLE-Module-Basesystem-15-SP3-2022-190",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Enterprise Storage versions 6 sans le correctif SUSE-Storage-6-2022-191",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server versions 15 SP1-BCL sans le correctif SUSE-SLE-Product-SLES-15-SP1-BCL-2022-191",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Software Development Kit versions 12 SP5 sans le correctif SUSE-SLE-SDK-12-SP5-2022-189",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server versions 12 SP3-ESPOS sans le correctif SUSE-SLE-SERVER-12-SP3-ESPOS-2022-189",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Manager Proxy versions 4.1 sans le correctif SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-190",
      "product": {
        "name": "SUSE Manager Proxy",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server versions 15 SP2-BCL sans le correctif SUSE-SLE-Product-SLES-15-SP2-BCL-2022-190",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension versions 12 SP5 sans le correctif SUSE-SLE-WE-12-SP5-2022-189",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Micro versions 5.1 sans le correctif SUSE-SUSE-MicroOS-5.1-2022-190",
      "product": {
        "name": "SUSE Linux Enterprise Micro",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE OpenStack Cloud Crowbar versions 9 sans le correctif SUSE-OpenStack-Cloud-Crowbar-9-2022-189",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications versions 12 SP3 sans le correctif SUSE-SLE-SAP-12-SP3-2022-189",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server versions 12 SP4-LTSS sans le correctif SUSE-SLE-SERVER-12-SP4-LTSS-2022-189",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications versions 15 sans le correctif SUSE-SLE-Product-SLES_SAP-15-2022-191",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP Applications versions 15 SP2 sans le correctif SUSE-SLE-Product-SLES_SAP-15-SP2-2022-190",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "openSUSE Leap versions 15.3 sans le correctif openSUSE-SLE-15.3-2022-190",
      "product": {
        "name": "openSUSE Leap",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    }
  ],
  "initial_release_date": "2022-01-27T00:00:00",
  "last_revision_date": "2022-01-27T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-086",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-01-27T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans pkexec de PolicyKit sur SUSE.\nElle permet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans pkexec de PolicyKit sur SUSE",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE du 25 janvier 2022",
      "url": "https://www.suse.com/security/cve/CVE-2021-4034.html"
    }
  ]
}
  CERTFR-2022-AVI-223
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits Moxa. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs et de la mesure de contournement proposée (cf. section Documentation).
- Séries UC-2100 micrologiciel versions 1.2 et antérieures
- Séries UC-2100-W micrologiciel versions 1.2 et antérieures
- Séries UC-3100 micrologiciel versions 1.1 et antérieures
- Séries UC-5100 micrologiciel versions 1.3 et antérieures
- Séries UC-8100A-ME-T micrologiciel versions 1.5 et antérieures
- Séries V2406C micrologiciel versions 1.2 et antérieures
- Séries V2403C micrologiciel versions 1.0 et antérieures
- Séries MC-1220 micrologiciel versions 1.4 et antérieures
- Séries DA-681C micrologiciel versions 1.1 et antérieures
- Séries DA-682C micrologiciel versions 1.2 et antérieures
- Séries DA-820C micrologiciel versions 1.2 et antérieures
- Séries AIG-501 micrologiciel versions 1.1 et antérieures
- Séries MPC-2070 micrologiciel versions 1.0 et antérieures
- Séries MPC-2101 micrologiciel versions 1.0 et antérieures
- Séries MPC-2120 micrologiciel versions 1.0 et antérieures
- Séries MPC-2121 micrologiciel versions 1.0 et antérieures
- Séries MPC-2190 micrologiciel versions 1.0 et antérieures
- Séries MPC-2240 micrologiciel versions 1.0 et antérieures
- Séries EXPC-1519 micrologiciel versions 1.0 et antérieures
L'éditeur ne propose pas de micrologiciel à installer pour la correction de la vulnérabilité identifiée CVE-2021-4034.
 Une procédure est listée dans la partie Solution de l'avis et est à appliquer sur chaque équipement vulnérable.
| Vendor | Product | Description | 
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cul\u003e \u003cli\u003eS\u00e9ries UC-2100 micrologiciel versions 1.2 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries UC-2100-W micrologiciel versions 1.2 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries UC-3100 micrologiciel versions 1.1 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries UC-5100 micrologiciel versions 1.3 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries UC-8100A-ME-T micrologiciel versions 1.5 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries V2406C micrologiciel versions 1.2 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries V2403C micrologiciel versions 1.0 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries MC-1220 micrologiciel versions 1.4 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries DA-681C micrologiciel versions 1.1 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries DA-682C micrologiciel versions 1.2 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries DA-820C micrologiciel versions 1.2 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries AIG-501 micrologiciel versions 1.1 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries MPC-2070 micrologiciel versions 1.0 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries MPC-2101 micrologiciel versions 1.0 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries MPC-2120 micrologiciel versions 1.0 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries MPC-2121 micrologiciel versions 1.0 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries MPC-2190 micrologiciel versions 1.0 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries MPC-2240 micrologiciel versions 1.0 et ant\u00e9rieures\u003c/li\u003e \u003cli\u003eS\u00e9ries EXPC-1519 micrologiciel versions 1.0 et ant\u00e9rieures\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eL\u0027\u00e9diteur ne propose pas de micrologiciel \u00e0 installer pour la correction de la vuln\u00e9rabilit\u00e9 identifi\u00e9e CVE-2021-4034.\u003cbr /\u003e Une proc\u00e9dure est list\u00e9e dans la partie Solution de l\u0027avis et est \u00e0 appliquer sur chaque \u00e9quipement vuln\u00e9rable.\u003c/p\u003e ",
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs et de la mesure de contournement propos\u00e9e (cf. section\nDocumentation).\n",
  "cves": [
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    }
  ],
  "initial_release_date": "2022-03-09T00:00:00",
  "last_revision_date": "2022-03-09T00:00:00",
  "links": [
    {
      "title": "Bulletin d\u0027actualit\u00e9 CERTFR-2022-ACT-004 du 31 janvier 2022",
      "url": "https://www.cert.ssi.gouv.fr/actualite/CERTFR-2022-ACT-004/"
    }
  ],
  "reference": "CERTFR-2022-AVI-223",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-03-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Moxa. Elle permet \u00e0\nun attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits Moxa",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moxa du 09 mars 2022",
      "url": "https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-pwnkit-vulnerability"
    }
  ]
}
  CERTFR-2023-AVI-0051
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | NorthStar Controller versions antérieures à 6.2.3 | ||
| Juniper Networks | N/A | Contrail Cloud versions antérieures à 13.7.0 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO | ||
| Juniper Networks | N/A | Juniper Networks Contrail Service Orchestration (CSO) versions antérieures à 6.3.0 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.3R1 | ||
| Juniper Networks | N/A | Cloud Native Contrail Networking versions antérieures à R22.3 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "NorthStar Controller versions ant\u00e9rieures \u00e0 6.2.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Contrail Cloud versions ant\u00e9rieures \u00e0 13.7.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO",
      "product": {
        "name": "Junos OS Evolved",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Juniper Networks Contrail Service Orchestration (CSO) versions ant\u00e9rieures \u00e0 6.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space versions ant\u00e9rieures \u00e0 22.3R1",
      "product": {
        "name": "Junos Space",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Native Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2016-4658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
    },
    {
      "name": "CVE-2016-8625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
    },
    {
      "name": "CVE-2016-8743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
    },
    {
      "name": "CVE-2017-12613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
    },
    {
      "name": "CVE-2019-1543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
    },
    {
      "name": "CVE-2019-1551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
    },
    {
      "name": "CVE-2020-0549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549"
    },
    {
      "name": "CVE-2020-0548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2020-11668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
    },
    {
      "name": "CVE-2020-0543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543"
    },
    {
      "name": "CVE-2020-14579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
    },
    {
      "name": "CVE-2020-14573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14573"
    },
    {
      "name": "CVE-2020-14577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
    },
    {
      "name": "CVE-2020-14578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
    },
    {
      "name": "CVE-2020-14621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
    },
    {
      "name": "CVE-2020-14562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14562"
    },
    {
      "name": "CVE-2020-14583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
    },
    {
      "name": "CVE-2020-14581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
    },
    {
      "name": "CVE-2020-14593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
    },
    {
      "name": "CVE-2020-14556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
    },
    {
      "name": "CVE-2020-14145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
    },
    {
      "name": "CVE-2020-14796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
    },
    {
      "name": "CVE-2020-14803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
    },
    {
      "name": "CVE-2020-14792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
    },
    {
      "name": "CVE-2020-14779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
    },
    {
      "name": "CVE-2020-14798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
    },
    {
      "name": "CVE-2020-14797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
    },
    {
      "name": "CVE-2020-14781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
    },
    {
      "name": "CVE-2020-14782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
    },
    {
      "name": "CVE-2020-14871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14871"
    },
    {
      "name": "CVE-2020-8698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8698"
    },
    {
      "name": "CVE-2020-8696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8696"
    },
    {
      "name": "CVE-2020-25704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
    },
    {
      "name": "CVE-2020-0466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
    },
    {
      "name": "CVE-2020-0465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
    },
    {
      "name": "CVE-2020-1971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
    },
    {
      "name": "CVE-2020-8695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8695"
    },
    {
      "name": "CVE-2019-20934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
    },
    {
      "name": "CVE-2021-3156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
    },
    {
      "name": "CVE-2021-3347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
    },
    {
      "name": "CVE-2021-23841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
    },
    {
      "name": "CVE-2021-23840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
    },
    {
      "name": "CVE-2021-3177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
    },
    {
      "name": "CVE-2020-12363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
    },
    {
      "name": "CVE-2020-12362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
    },
    {
      "name": "CVE-2020-12364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
    },
    {
      "name": "CVE-2021-27365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
    },
    {
      "name": "CVE-2021-27363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
    },
    {
      "name": "CVE-2021-27364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
    },
    {
      "name": "CVE-2020-27170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
    },
    {
      "name": "CVE-2021-3450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
    },
    {
      "name": "CVE-2020-35498",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35498"
    },
    {
      "name": "CVE-2021-28950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
    },
    {
      "name": "CVE-2021-29154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
    },
    {
      "name": "CVE-2020-36322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
    },
    {
      "name": "CVE-2021-2194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
    },
    {
      "name": "CVE-2021-2162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
    },
    {
      "name": "CVE-2021-2179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
    },
    {
      "name": "CVE-2021-2307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
    },
    {
      "name": "CVE-2021-2180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
    },
    {
      "name": "CVE-2021-2144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
    },
    {
      "name": "CVE-2021-2226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
    },
    {
      "name": "CVE-2021-2169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
    },
    {
      "name": "CVE-2021-2202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
    },
    {
      "name": "CVE-2021-2166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
    },
    {
      "name": "CVE-2021-2174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
    },
    {
      "name": "CVE-2021-2154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
    },
    {
      "name": "CVE-2020-28196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
    },
    {
      "name": "CVE-2021-2178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
    },
    {
      "name": "CVE-2021-2146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
    },
    {
      "name": "CVE-2021-2160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
    },
    {
      "name": "CVE-2021-2171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
    },
    {
      "name": "CVE-2021-2161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
    },
    {
      "name": "CVE-2021-2163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
    },
    {
      "name": "CVE-2021-29650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
    },
    {
      "name": "CVE-2021-23017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
    },
    {
      "name": "CVE-2021-25217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
    },
    {
      "name": "CVE-2021-33033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
    },
    {
      "name": "CVE-2020-24512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
    },
    {
      "name": "CVE-2020-24513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
    },
    {
      "name": "CVE-2020-24511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
    },
    {
      "name": "CVE-2021-32399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
    },
    {
      "name": "CVE-2021-33034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
    },
    {
      "name": "CVE-2021-3564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
    },
    {
      "name": "CVE-2021-3573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
    },
    {
      "name": "CVE-2020-36385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
    },
    {
      "name": "CVE-2020-27827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27827"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    },
    {
      "name": "CVE-2021-33909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
    },
    {
      "name": "CVE-2021-2388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
    },
    {
      "name": "CVE-2021-2341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
    },
    {
      "name": "CVE-2021-2432",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
    },
    {
      "name": "CVE-2021-2369",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
    },
    {
      "name": "CVE-2021-2389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
    },
    {
      "name": "CVE-2021-2372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
    },
    {
      "name": "CVE-2021-2342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
    },
    {
      "name": "CVE-2021-2385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
    },
    {
      "name": "CVE-2021-2390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-3712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
    },
    {
      "name": "CVE-2021-3715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
    },
    {
      "name": "CVE-2021-39275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
    },
    {
      "name": "CVE-2021-34798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
    },
    {
      "name": "CVE-2021-40438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
    },
    {
      "name": "CVE-2021-3752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
    },
    {
      "name": "CVE-2021-27219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
    },
    {
      "name": "CVE-2020-26137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
    },
    {
      "name": "CVE-2020-28469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
    },
    {
      "name": "CVE-2020-26116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
    },
    {
      "name": "CVE-2021-35603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
    },
    {
      "name": "CVE-2021-35586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
    },
    {
      "name": "CVE-2021-35559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
    },
    {
      "name": "CVE-2021-35567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
    },
    {
      "name": "CVE-2021-35578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
    },
    {
      "name": "CVE-2021-35550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
    },
    {
      "name": "CVE-2021-35561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
    },
    {
      "name": "CVE-2021-35565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
    },
    {
      "name": "CVE-2021-35564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
    },
    {
      "name": "CVE-2021-35556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
    },
    {
      "name": "CVE-2021-26691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
    },
    {
      "name": "CVE-2021-0920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
    },
    {
      "name": "CVE-2021-42739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
    },
    {
      "name": "CVE-2021-44790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
    },
    {
      "name": "CVE-2021-4083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
    },
    {
      "name": "CVE-2021-4155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
    },
    {
      "name": "CVE-2022-21349",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
    },
    {
      "name": "CVE-2022-21277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21277"
    },
    {
      "name": "CVE-2022-21291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
    },
    {
      "name": "CVE-2022-21340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
    },
    {
      "name": "CVE-2022-21282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
    },
    {
      "name": "CVE-2022-21341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
    },
    {
      "name": "CVE-2022-21365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
    },
    {
      "name": "CVE-2022-21305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
    },
    {
      "name": "CVE-2022-21366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
    },
    {
      "name": "CVE-2022-21360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
    },
    {
      "name": "CVE-2022-21296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
    },
    {
      "name": "CVE-2022-21293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
    },
    {
      "name": "CVE-2022-21248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
    },
    {
      "name": "CVE-2022-21299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
    },
    {
      "name": "CVE-2022-21294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
    },
    {
      "name": "CVE-2022-21283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
    },
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    },
    {
      "name": "CVE-2021-4028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
    },
    {
      "name": "CVE-2022-2526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
    },
    {
      "name": "CVE-2022-38177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38177"
    },
    {
      "name": "CVE-2022-29154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
    },
    {
      "name": "CVE-2022-21449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21449"
    },
    {
      "name": "CVE-2022-21476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
    },
    {
      "name": "CVE-2022-21125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
    },
    {
      "name": "CVE-2022-21123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
    },
    {
      "name": "CVE-2022-21166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
    },
    {
      "name": "CVE-2022-38178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38178"
    },
    {
      "name": "CVE-2018-25032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
    },
    {
      "name": "CVE-2022-32250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
    },
    {
      "name": "CVE-2021-45960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
    },
    {
      "name": "CVE-2022-22827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
    },
    {
      "name": "CVE-2022-22825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
    },
    {
      "name": "CVE-2022-22822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
    },
    {
      "name": "CVE-2022-22824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
    },
    {
      "name": "CVE-2021-46143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
    },
    {
      "name": "CVE-2022-22826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
    },
    {
      "name": "CVE-2022-23852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
    },
    {
      "name": "CVE-2022-22823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
    },
    {
      "name": "CVE-2022-0330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
    },
    {
      "name": "CVE-2022-22942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
    },
    {
      "name": "CVE-2022-0492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
    },
    {
      "name": "CVE-2022-25236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
    },
    {
      "name": "CVE-2022-25315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
    },
    {
      "name": "CVE-2022-25235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
    },
    {
      "name": "CVE-2022-22720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
    },
    {
      "name": "CVE-2022-0778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
    },
    {
      "name": "CVE-2022-21434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
    },
    {
      "name": "CVE-2022-21443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
    },
    {
      "name": "CVE-2022-21496",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
    },
    {
      "name": "CVE-2022-21426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
    },
    {
      "name": "CVE-2022-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
    },
    {
      "name": "CVE-2022-1729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
    },
    {
      "name": "CVE-2021-30465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-30465"
    },
    {
      "name": "CVE-2021-42574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
    },
    {
      "name": "CVE-2022-21541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
    },
    {
      "name": "CVE-2022-34169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
    },
    {
      "name": "CVE-2022-21549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21549"
    },
    {
      "name": "CVE-2022-21540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
    },
    {
      "name": "CVE-2007-6755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
    },
    {
      "name": "CVE-2022-1271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
    },
    {
      "name": "CVE-2021-3765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
    },
    {
      "name": "CVE-2022-24903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
    },
    {
      "name": "CVE-2022-21626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
    },
    {
      "name": "CVE-2022-21619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
    },
    {
      "name": "CVE-2022-21628",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
    },
    {
      "name": "CVE-2022-21624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
    },
    {
      "name": "CVE-2019-11287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11287"
    },
    {
      "name": "CVE-2023-22397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22397"
    },
    {
      "name": "CVE-2023-22403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22403"
    },
    {
      "name": "CVE-2023-22398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22398"
    },
    {
      "name": "CVE-2023-22399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22399"
    },
    {
      "name": "CVE-2023-22417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22417"
    },
    {
      "name": "CVE-2023-22395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22395"
    },
    {
      "name": "CVE-2023-22391",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22391"
    },
    {
      "name": "CVE-2023-22409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22409"
    },
    {
      "name": "CVE-2023-22407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22407"
    },
    {
      "name": "CVE-2023-22414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22414"
    },
    {
      "name": "CVE-2023-22393",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22393"
    },
    {
      "name": "CVE-2023-22415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22415"
    },
    {
      "name": "CVE-2023-22405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22405"
    },
    {
      "name": "CVE-2023-22412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22412"
    },
    {
      "name": "CVE-2020-24489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24489"
    },
    {
      "name": "CVE-2023-22404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22404"
    },
    {
      "name": "CVE-2021-3504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3504"
    },
    {
      "name": "CVE-2023-22394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22394"
    },
    {
      "name": "CVE-2023-22406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22406"
    },
    {
      "name": "CVE-2018-8046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-8046"
    },
    {
      "name": "CVE-2007-2285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-2285"
    },
    {
      "name": "CVE-2021-35940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35940"
    },
    {
      "name": "CVE-2023-22411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22411"
    },
    {
      "name": "CVE-2023-22401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22401"
    },
    {
      "name": "CVE-2020-15778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
    },
    {
      "name": "CVE-2023-22396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22396"
    },
    {
      "name": "CVE-2023-22402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22402"
    },
    {
      "name": "CVE-2021-3621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
    },
    {
      "name": "CVE-2023-22400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22400"
    },
    {
      "name": "CVE-2023-22408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22408"
    },
    {
      "name": "CVE-2022-0934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
    },
    {
      "name": "CVE-2021-40085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40085"
    },
    {
      "name": "CVE-2023-22410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22410"
    },
    {
      "name": "CVE-2023-22416",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22416"
    },
    {
      "name": "CVE-2023-22413",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22413"
    }
  ],
  "initial_release_date": "2023-01-23T00:00:00",
  "last_revision_date": "2023-01-23T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0051",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-01-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70195 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10K-Series-PFE-crash-upon-receipt-of-specific-genuine-packets-when-sFlow-is-enabled-CVE-2023-22399?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70183 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Cloud-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Cloud-release-13-7-0?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70203 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-RPD-crash-can-happen-due-to-an-MPLS-TE-tunnel-configuration-change-on-a-directly-connected-router-CVE-2023-22407?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70192 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Receipt-of-crafted-TCP-packets-on-Ethernet-console-port-results-in-MBUF-leak-leading-to-Denial-of-Service-DoS-CVE-2023-22396?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70213 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-A-memory-leak-might-be-observed-in-IPsec-VPN-scenario-leading-to-an-FPC-crash-CVE-2023-22417?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70193 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-PTX10003-An-attacker-sending-specific-genuine-packets-will-cause-a-memory-leak-in-the-PFE-leading-to-a-Denial-of-Service-CVE-2023-22397?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70181 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-might-crash-when-MPLS-ping-is-performed-on-BGP-LSPs-CVE-2023-22398?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70186 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70179 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Northstar-Controller-Pivotal-RabbitMQ-contains-a-web-management-plugin-that-is-vulnerable-to-a-Denial-of-Service-DoS-attack-CVE-2019-11287?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70208 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flowd-daemon-will-crash-if-the-SIP-ALG-is-enabled-and-specific-SIP-messages-are-processed-CVE-2023-22412?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70201 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX5k-Series-EX46xx-Series-MAC-limiting-feature-stops-working-after-PFE-restart-device-reboot--CVE-2023-22405?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70209 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-FPC-crash-when-an-IPsec6-tunnel-processes-specific-IPv4-packets-CVE-2023-22413?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70187 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-ACX2K-Series-Receipt-of-a-high-rate-of-specific-traffic-will-lead-to-a-Denial-of-Service-DoS-CVE-2023-22391?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70199 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10k-Series-ICCP-flap-will-be-observed-due-to-excessive-specific-traffic-CVE-2023-22403?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70180 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificates-CVE-2022-0778?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70198 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-The-kernel-might-restart-in-a-BGP-scenario-where-bgp-auto-discovery-is-enabled-and-such-a-neighbor-flaps-CVE-2023-22402?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70196 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-A-specific-SNMP-GET-operation-and-a-specific-CLI-commands-cause-resources-to-leak-and-eventually-the-evo-pfemand-process-will-crash-CVE-2023-22400?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70197 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PTX10008-PTX10016-When-a-specific-SNMP-MIB-is-queried-the-FPC-will-crash-CVE-2023-22401?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70202 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-memory-leak-which-will-ultimately-lead-to-an-rpd-crash-will-be-observed-when-a-peer-interface-flaps-continuously-in-a-Segment-Routing-scenario-CVE-2023-22406?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70190 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Memory-leak-due-to-receipt-of-specially-crafted-SIP-calls-CVE-2023-22394?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70191 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-In-an-MPLS-scenario-the-processing-of-specific-packets-to-the-device-causes-a-buffer-leak-and-ultimately-a-loss-of-connectivity-CVE-2023-22395?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70204 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Upon-processing-of-a-specific-SIP-packet-an-FPC-can-crash-CVE-2023-22408?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70200 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-When-IPsec-VPN-is-configured-iked-will-core-when-a-specifically-formatted-payload-is-received-CVE-2023-22404?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70212 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-if-SIP-ALG-is-enabled-and-a-malicious-SIP-packet-is-received-CVE-2023-22416?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70185 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70211 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flow-processing-daemon-flowd-will-crash-when-a-specific-H-323-packet-is-received-CVE-2023-22415?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70210 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-An-FPC-memory-leak-is-observed-when-specific-multicast-packets-are-processed-CVE-2023-22414?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70206 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-with-MPC10-MPC11-When-Suspicious-Control-Flow-Detection-scfd-is-enabled-and-an-attacker-is-sending-specific-traffic-this-causes-a-memory-leak-CVE-2023-22410?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70205 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-with-SPC3-When-an-inconsistent-NAT-configuration-exists-and-a-specific-CLI-command-is-issued-the-SPC-will-reboot-CVE-2023-22409?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70182 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70189 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-BGP-route-with-invalid-next-hop-CVE-2023-22393?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70207 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-when-Unified-Policies-are-used-with-IPv6-and-certain-dynamic-applications-are-rejected-by-the-device-CVE-2023-22411?language=en_US"
    }
  ]
}
  CERTFR-2022-AVI-083
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans pkexec de PolicyKit sur Ubuntu. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Ubuntu | Ubuntu | Ubuntu versions 20.04 sans le correctif policykit-1 - 0.105-26ubuntu1.2 | ||
| Ubuntu | Ubuntu | Ubuntu versions 16.04 sans le correctif policykit-1 - 0.105-14.1ubuntu0.5+esm1 | ||
| Ubuntu | Ubuntu | Ubuntu versions 18.04 sans le correctif policykit-1 - 0.105-20ubuntu0.18.04.6 | ||
| Ubuntu | Ubuntu | Ubuntu versions 21.10 sans le correctif policykit-1 - 0.105-31ubuntu0.1 | ||
| Ubuntu | Ubuntu | Ubuntu versions 14.04 sans le correctif policykit-1 - 0.105-4ubuntu3.14.04.6+esm1 | 
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Ubuntu versions 20.04 sans le correctif policykit-1 - 0.105-26ubuntu1.2",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu versions 16.04 sans le correctif policykit-1 - 0.105-14.1ubuntu0.5+esm1",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu versions 18.04 sans le correctif policykit-1 - 0.105-20ubuntu0.18.04.6",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu versions 21.10 sans le correctif policykit-1 - 0.105-31ubuntu0.1",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu versions 14.04 sans le correctif policykit-1 - 0.105-4ubuntu3.14.04.6+esm1",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    }
  ],
  "initial_release_date": "2022-01-27T00:00:00",
  "last_revision_date": "2022-01-27T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-083",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-01-27T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans pkexec de PolicyKit sur Ubuntu.\nElle permet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans pkexec de PolicyKit sur Ubuntu",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5252-2 du 25 janvier 2022",
      "url": "https://ubuntu.com/security/notices/USN-5252-2"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5252-1 du 25 janvier 2022",
      "url": "https://ubuntu.com/security/notices/USN-5252-1"
    }
  ]
}
  CERTFR-2022-AVI-239
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Spectrum | IBM Spectrum Protect Plus Container Backup and Restore for Red Hat OpenShift versions 10.1.x antérieures à 10.1.10 | ||
| IBM | Spectrum | IBM Spectrum Protect for Virtual Environments: Data Protection for VMware versions 8.1.x antérieures à 8.1.14 | ||
| IBM | Spectrum | IBM Spectrum Copy Data Management versions 2.2.x antérieures à 2.2.15 | ||
| IBM | Spectrum | IBM Spectrum Protect Backup-Archive Client web user interface versions 8.1.x antérieures à 8.1.14 | ||
| IBM | Spectrum | IBM Spectrum Protect Plus versions 10.1.x antérieures à 10.1.10 | ||
| IBM | Spectrum | IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes versions 10.1.x antérieures à 10.1.10 | ||
| IBM | Spectrum | IBM Spectrum Protect for Virtual Environments: Data Protection for Hyper-V versions 8.1.x antérieures à 8.1.14 | ||
| IBM | Spectrum | IBM Spectrum Protect Client Management Service versions 8.1.x antérieures à 8.1.14 | ||
| IBM | Spectrum | IBM Spectrum Protect Operations Center versions 8.1.x antérieures à 8.1.14 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 7.0, 8.0, 8.5 et 9.0 avec Content Collector for Email versions 4.0.x antérieures à 4.0.1 | ||
| IBM | Spectrum | IBM Spectrum Protect Plus File Systems Agent versions 10.1.x antérieures à 10.1.10 | ||
| IBM | Spectrum | IBM Spectrum Protect for Space Management versions 8.1.x antérieures à 8.1.14 | ||
| IBM | Spectrum | IBM Spectrum Protect Server versions 8.1.x antérieures à 8.1.14 | 
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "IBM Spectrum Protect Plus Container Backup and Restore for Red Hat OpenShift versions 10.1.x ant\u00e9rieures \u00e0 10.1.10",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Spectrum Protect for Virtual Environments: Data Protection for VMware versions 8.1.x ant\u00e9rieures \u00e0 8.1.14",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Spectrum Copy Data Management versions 2.2.x ant\u00e9rieures \u00e0 2.2.15",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Spectrum Protect Backup-Archive Client web user interface versions 8.1.x ant\u00e9rieures \u00e0 8.1.14",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Spectrum Protect Plus versions 10.1.x ant\u00e9rieures \u00e0 10.1.10",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes versions 10.1.x ant\u00e9rieures \u00e0 10.1.10",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Spectrum Protect for Virtual Environments: Data Protection for Hyper-V versions 8.1.x ant\u00e9rieures \u00e0 8.1.14",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Spectrum Protect Client Management Service versions 8.1.x ant\u00e9rieures \u00e0 8.1.14",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Spectrum Protect Operations Center versions 8.1.x ant\u00e9rieures \u00e0 8.1.14",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM WebSphere Application Server versions 7.0, 8.0, 8.5 et 9.0 avec Content Collector for Email versions 4.0.x ant\u00e9rieures \u00e0 4.0.1",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Spectrum Protect Plus File Systems Agent versions 10.1.x ant\u00e9rieures \u00e0 10.1.10",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Spectrum Protect for Space Management versions 8.1.x ant\u00e9rieures \u00e0 8.1.14",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "IBM Spectrum Protect Server versions 8.1.x ant\u00e9rieures \u00e0 8.1.14",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-41182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41182"
    },
    {
      "name": "CVE-2022-0391",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
    },
    {
      "name": "CVE-2021-35517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35517"
    },
    {
      "name": "CVE-2022-21680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21680"
    },
    {
      "name": "CVE-2021-39002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39002"
    },
    {
      "name": "CVE-2021-36090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36090"
    },
    {
      "name": "CVE-2021-41184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41184"
    },
    {
      "name": "CVE-2021-41183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41183"
    },
    {
      "name": "CVE-2021-38926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38926"
    },
    {
      "name": "CVE-2021-23222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23222"
    },
    {
      "name": "CVE-2021-29678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29678"
    },
    {
      "name": "CVE-2020-35508",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35508"
    },
    {
      "name": "CVE-2022-23806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
    },
    {
      "name": "CVE-2021-23214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23214"
    },
    {
      "name": "CVE-2022-23773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
    },
    {
      "name": "CVE-2021-38951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38951"
    },
    {
      "name": "CVE-2020-8492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
    },
    {
      "name": "CVE-2021-3156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
    },
    {
      "name": "CVE-2022-23772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
    },
    {
      "name": "CVE-2021-23727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23727"
    },
    {
      "name": "CVE-2021-35578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
    },
    {
      "name": "CVE-2021-38931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38931"
    },
    {
      "name": "CVE-2021-3139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3139"
    },
    {
      "name": "CVE-2021-44716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
    },
    {
      "name": "CVE-2021-20373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20373"
    },
    {
      "name": "CVE-2020-15436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15436"
    },
    {
      "name": "CVE-2021-3712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
    },
    {
      "name": "CVE-2022-0235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0235"
    },
    {
      "name": "CVE-2021-33026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33026"
    },
    {
      "name": "CVE-2020-14323",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14323"
    },
    {
      "name": "CVE-2021-44717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
    },
    {
      "name": "CVE-2021-41617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
    },
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    },
    {
      "name": "CVE-2022-21681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21681"
    },
    {
      "name": "CVE-2020-35513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35513"
    }
  ],
  "initial_release_date": "2022-03-14T00:00:00",
  "last_revision_date": "2022-03-14T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-239",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-03-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 6562471 du 11 mars 2022",
      "url": "https://www.ibm.com/support/pages/node/6562471"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 6562895 du 11 mars 2022",
      "url": "https://www.ibm.com/support/pages/node/6562895"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 6445699 du 11 mars 2022",
      "url": "https://www.ibm.com/support/pages/node/6445699"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 6562401 du 11 mars 2022",
      "url": "https://www.ibm.com/support/pages/node/6562401"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 6562843 du 11 mars 2022",
      "url": "https://www.ibm.com/support/pages/node/6562843"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 6562849 du 11 mars 2022",
      "url": "https://www.ibm.com/support/pages/node/6562849"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 6562873 du 11 mars 2022",
      "url": "https://www.ibm.com/support/pages/node/6562873"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 6562383 du 11 mars 2022",
      "url": "https://www.ibm.com/support/pages/node/6562383"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 6562405 du 11 mars 2022",
      "url": "https://www.ibm.com/support/pages/node/6562405"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 6562919 du 11 mars 2022",
      "url": "https://www.ibm.com/support/pages/node/6562919"
    }
  ]
}
  CERTFR-2022-AVI-547
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SICAM GridEdge Essential with GDS ARM (6MD7881-2AA10) versions antérieures à V2.6.6 | ||
| Siemens | N/A | SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) toutes versions | ||
| Siemens | N/A | SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0) toutes versions | ||
| Siemens | N/A | TALON TC Compact (BACnet) versions antérieures à V3.5 | ||
| Siemens | N/A | SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0) toutes versions | ||
| Siemens | N/A | SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) toutes versions | ||
| Siemens | N/A | SIMATIC RF650R (6GT2811-6AB20) versions antérieures à V4.0.1 | ||
| Siemens | N/A | SIMATIC RF610R (6GT2811-6BC10) versions antérieures à V4.0.1 | ||
| Siemens | N/A | SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | EN100 Ethernet module IEC 104 variant toutes versions | ||
| Siemens | N/A | SICAM GridEdge Essential ARM (6MD7881-2AA30) versions antérieures à V2.6.6 | ||
| Siemens | N/A | SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0) toutes versions | ||
| Siemens | N/A | Teamcenter V12.4 versions antérieures à V12.4.0.13 | ||
| Siemens | N/A | SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE M804PB (6GK5804-0AP00-2AA2) toutes versions | ||
| Siemens | N/A | APOGEE PXC Modular (BACnet) versions antérieures à V3.5 | ||
| Siemens | N/A | SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0) toutes versions | ||
| Siemens | N/A | EN100 Ethernet module IEC 61850 variant versions antérieures à V4.37 | ||
| Siemens | N/A | Xpedition Designer versions antérieures à X.2.11 | ||
| Siemens | N/A | SIMATIC NET PC Software V15 toutes versions | ||
| Siemens | N/A | SIMATIC RF186C (6GT2002-0JE20) versions antérieures à V2.0.1 | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) toutes versions | ||
| Siemens | N/A | SIMATIC CP 1543-1 (incl. SIPLUS variants) versions antérieures à V3.0 | ||
| Siemens | N/A | SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) toutes versions | ||
| Siemens | N/A | SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) toutes versions | ||
| Siemens | N/A | SIMATIC WinCC (TIA Portal) toutes versions | ||
| Siemens | N/A | EN100 Ethernet module Modbus TCP variant toutes versions | ||
| Siemens | N/A | SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) toutes versions | ||
| Siemens | N/A | SIMATIC RF188C (6GT2002-0JE40) versions antérieures à V2.0.1 | ||
| Siemens | N/A | SINAUT Software ST7sc toutes versions | ||
| Siemens | N/A | SIMATIC STEP 7 V5.X toutes versions | ||
| Siemens | N/A | SIMATIC RF166C (6GT2002-0EE20) versions antérieures à V2.0.1 | ||
| Siemens | N/A | Teamcenter V13.0 versions antérieures à V13.0.0.9 | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) toutes versions | ||
| Siemens | N/A | SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) toutes versions | ||
| Siemens | N/A | SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) toutes versions | ||
| Siemens | N/A | SIMATIC CP 343-1 Advanced (6GK7343-1GX31-0XE0) toutes versions | ||
| Siemens | N/A | SIMATIC CP 1626 (6GK1162-6AA01) toutes versions | ||
| Siemens | N/A | TIA Portal V15 toutes versions | ||
| Siemens | N/A | SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2) versions antérieures à V6.5 | ||
| Siemens | N/A | SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00) toutes versions | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) toutes versions | ||
| Siemens | N/A | SIMATIC NET PC Software V14 toutes versions | ||
| Siemens | N/A | APOGEE PXC Compact (P2 Ethernet) toutes versions | ||
| Siemens | N/A | RUGGEDCOM CROSSBOW Station Access Controller toutes versions | ||
| Siemens | N/A | SCALANCE XR528-6M (6GK5528-0AA00-2AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SIMATIC RF188CI (6GT2002-0JE60) versions antérieures à V2.0.1 | ||
| Siemens | N/A | SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0) toutes versions | ||
| Siemens | N/A | SICAM GridEdge Essential Intel (6MD7881-2AA40) versions antérieures à V2.6.6 | ||
| Siemens | N/A | TIA Portal V16 toutes versions | ||
| Siemens | N/A | SIMATIC PDM toutes versions | ||
| Siemens | N/A | Spectrum Power 4 toutes versions using Shared HIS | ||
| Siemens | N/A | SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0) toutes versions | ||
| Siemens | N/A | SCALANCE XR552-12M (6GK5552-0AA00-2AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SIMATIC NET PC Software V16 toutes versions | ||
| Siemens | N/A | SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0) toutes versions | ||
| Siemens | N/A | SIMATIC MV540 H (6GF3540-0GE10) toutes versions | ||
| Siemens | N/A | SIMATIC RF360R (6GT2801-5BA30) versions antérieures à V2.0.1 | ||
| Siemens | N/A | SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) toutes versions | ||
| Siemens | N/A | SIMATIC STEP 7 (TIA Portal) toutes versions | ||
| Siemens | N/A | SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE XM408-4C (6GK5408-4GP00-2AM2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2) versions antérieures à V6.5 | ||
| Siemens | N/A | SINUMERIK Edge versions antérieures à V3.3.0 | ||
| Siemens | N/A | SCALANCE LPE9403 (6GK5998-3GS00-2AC2) versions antérieures à V2.0 | ||
| Siemens | N/A | Spectrum Power MGMS toutes versions using Shared HIS | ||
| Siemens | N/A | SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SIMATIC ET 200SP Open Controller (incl. SIPLUS variants) toutes versions | ||
| Siemens | N/A | SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) toutes versions | ||
| Siemens | N/A | Teamcenter V13.2 toutes versions | ||
| Siemens | N/A | SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0) toutes versions | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) toutes versions | ||
| Siemens | N/A | SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0) versions antérieures à V1.1 | ||
| Siemens | N/A | SCALANCE S615 (6GK5615-0AA00-2AA2) toutes versions | ||
| Siemens | N/A | SCALANCE M874-3 (6GK5874-3AA00-2AA2) toutes versions | ||
| Siemens | N/A | RUGGEDCOM ROX Series toutes versions | ||
| Siemens | N/A | SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) toutes versions | ||
| Siemens | N/A | SIMATIC RF185C (6GT2002-0JE10) versions antérieures à V2.0.1 | ||
| Siemens | N/A | SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE MUM853-1 (RoW) (6GK5853-2EA00-2AA1) toutes versions | ||
| Siemens | N/A | EN100 Ethernet module PROFINET IO variant toutes versions | ||
| Siemens | N/A | SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | TIA Portal Cloud toutes versions | ||
| Siemens | N/A | SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) toutes versions | ||
| Siemens | N/A | SIMATIC S7-PLCSIM Advanced toutes versions | ||
| Siemens | N/A | SINEMA Remote Connect Server versions antérieures à V3.1 | ||
| Siemens | N/A | SIMATIC Logon toutes versions | ||
| Siemens | N/A | SCALANCE M874-2 (6GK5874-2AA00-2AA2) toutes versions | ||
| Siemens | N/A | SIMATIC MV550 S (6GF3550-0CD10) toutes versions | ||
| Siemens | N/A | SIMATIC MV550 H (6GF3550-0GE10) toutes versions | ||
| Siemens | N/A | TIM 1531 IRC (6GK7543-1MX00-0XE0) toutes versions | ||
| Siemens | N/A | SIPLUS NET CP 343-1 Advanced (6AG1343-1GX31-4XE0) toutes versions | ||
| Siemens | N/A | Mendix SAML Module (Mendix 8 compatible) versions antérieures à 2.2.2 | ||
| Siemens | N/A | APOGEE PXC Modular (P2 Ethernet) toutes versions | ||
| Siemens | N/A | Teamcenter V13.3 versions antérieures à V13.3.0.3 | ||
| Siemens | N/A | SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2) versions antérieures à V6.5 | ||
| Siemens | N/A | Teamcenter Active Workspace V6.0 versions antérieures à V6.0.3 | ||
| Siemens | N/A | SIMATIC S7-1200 CPU family (incl. SIPLUS variants) toutes versions | ||
| Siemens | N/A | SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) toutes versions | ||
| Siemens | N/A | SCALANCE SC622-2C (6GK5622-2GS00-2AC2) toutes versions versions antérieures à V2.3.1 | ||
| Siemens | N/A | Mendix SAML Module (Mendix 7 compatible) versions antérieures à 1.16.6 | ||
| Siemens | N/A | EN100 Ethernet module DNP3 IP variant toutes versions | ||
| Siemens | N/A | SCALANCE XM416-4C (6GK5416-4GS00-2AM2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) toutes versions | ||
| Siemens | N/A | Industrial Edge - PROFINET IO Connector toutes versions | ||
| Siemens | N/A | SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2) versions antérieures à V6.5 | ||
| Siemens | N/A | SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) toutes versions | ||
| Siemens | N/A | RUGGEDCOM ROS Series toutes versions | ||
| Siemens | N/A | TIA Portal V17 toutes versions | ||
| Siemens | N/A | TALON TC Modular (BACnet) versions antérieures à V3.5 | ||
| Siemens | N/A | SIMATIC PCS 7 TeleControl toutes versions | ||
| Siemens | N/A | APOGEE PXC Compact (BACnet) versions antérieures à V3.5 | ||
| Siemens | N/A | SCALANCE MUM856-1 (NAM) (6GK5856-2EA00-3BA1) toutes versions | ||
| Siemens | N/A | SIMATIC RF685R (6GT2811-6CA10) versions antérieures à V4.0.1 | ||
| Siemens | N/A | SINEMA Server V14 toutes versions | ||
| Siemens | N/A | SCALANCE SC646-2C (6GK5646-2GS00-2AC2) toutes versions versions antérieures à V2.3.1 | ||
| Siemens | N/A | SIMATIC RF680R (6GT2811-6AA10) versions antérieures à V4.0.1 | ||
| Siemens | N/A | SIMATIC MV560 U (6GF3560-0LE10) toutes versions | ||
| Siemens | N/A | Industrial Edge - SIMATIC S7 Connector App versions antérieures à V1.7.0 | ||
| Siemens | N/A | SINEC INS toutes versions | ||
| Siemens | N/A | SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) toutes versions | ||
| Siemens | N/A | SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE SC636-2C (6GK5636-2GS00-2AC2) toutes versions versions antérieures à V2.3.1 | ||
| Siemens | N/A | TIA Administrator toutes versions | ||
| Siemens | N/A | SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | TeleControl Server Basic V3 toutes versions | ||
| Siemens | N/A | SINAUT ST7CC toutes versions | ||
| Siemens | N/A | SCALANCE XM408-8C (6GK5408-8GS00-2AM2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SIMATIC NET PC Software V17 toutes versions | ||
| Siemens | N/A | Spectrum Power 7 toutes versions using Shared HIS | ||
| Siemens | N/A | SIMATIC MV560 X (6GF3560-0HE10) toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 Software Controller (incl. F) toutes versions | ||
| Siemens | N/A | SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0) toutes versions | ||
| Siemens | N/A | SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0) toutes versions | ||
| Siemens | N/A | SINEMA Remote Connect Server versions antérieures à 3.0 SP2 | ||
| Siemens | N/A | Industrial Edge - OPC UA Connector toutes versions | ||
| Siemens | N/A | Teamcenter Active Workspace V5.2 versions antérieures à V5.2.9 | ||
| Siemens | N/A | SCALANCE SC642-2C (6GK5642-2GS00-2AC2) toutes versions versions antérieures à V2.3.1 | ||
| Siemens | N/A | SINEC NMS toutes versions | ||
| Siemens | N/A | Mendix SAML Module (Mendix 9 compatible) versions antérieures à 3.2.3 | ||
| Siemens | N/A | Teamcenter V14.0 toutes versions | ||
| Siemens | N/A | SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) toutes versions | ||
| Siemens | N/A | SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0) toutes versions | ||
| Siemens | N/A | SIMATIC RF615R (6GT2811-6CC10) versions antérieures à V4.0.1 | ||
| Siemens | N/A | SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00) toutes versions | ||
| Siemens | N/A | SIMATIC RF186CI (6GT2002-0JE50) versions antérieures à V2.0.1 | ||
| Siemens | N/A | SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2) versions antérieures à V6.5 | ||
| Siemens | N/A | SIMATIC CP 1628 (6GK1162-8AA00) toutes versions | ||
| Siemens | N/A | SICAM GridEdge Essential with GDS Intel (6MD7881-2AA20) versions antérieures à V2.6.6 | ||
| Siemens | N/A | Teamcenter V13.1 versions antérieures à V13.1.0.9 | ||
| Siemens | N/A | SCALANCE SC632-2C (6GK5632-2GS00-2AC2) toutes versions versions antérieures à V2.3.1 | ||
| Siemens | N/A | SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) toutes versions | ||
| Siemens | N/A | SIMATIC MV540 S (6GF3540-0CD10) toutes versions | ||
| Siemens | N/A | SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0) toutes versions | ||
| Siemens | N/A | SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) toutes versions | ||
| Siemens | N/A | SIMATIC PCS neo toutes versions | ||
| Siemens | N/A | RUGGEDCOM NMS toutes versions | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SICAM GridEdge Essential with GDS ARM (6MD7881-2AA10) versions ant\u00e9rieures \u00e0 V2.6.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TALON TC Compact (BACnet) versions ant\u00e9rieures \u00e0 V3.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF650R (6GT2811-6AB20) versions ant\u00e9rieures \u00e0 V4.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF610R (6GT2811-6BC10) versions ant\u00e9rieures \u00e0 V4.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "EN100 Ethernet module IEC 104 variant toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SICAM GridEdge Essential ARM (6MD7881-2AA30) versions ant\u00e9rieures \u00e0 V2.6.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter V12.4 versions ant\u00e9rieures \u00e0 V12.4.0.13",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M804PB (6GK5804-0AP00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "APOGEE PXC Modular (BACnet) versions ant\u00e9rieures \u00e0 V3.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "EN100 Ethernet module IEC 61850 variant versions ant\u00e9rieures \u00e0 V4.37",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Xpedition Designer versions ant\u00e9rieures \u00e0 X.2.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC NET PC Software V15 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF186C (6GT2002-0JE20) versions ant\u00e9rieures \u00e0 V2.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1543-1 (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC (TIA Portal) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "EN100 Ethernet module Modbus TCP variant toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF188C (6GT2002-0JE40) versions ant\u00e9rieures \u00e0 V2.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINAUT Software ST7sc toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V5.X toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF166C (6GT2002-0EE20) versions ant\u00e9rieures \u00e0 V2.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter V13.0 versions ant\u00e9rieures \u00e0 V13.0.0.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 343-1 Advanced (6GK7343-1GX31-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1626 (6GK1162-6AA01) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal V15 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC NET PC Software V14 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "APOGEE PXC Compact (P2 Ethernet) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM CROSSBOW Station Access Controller toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF188CI (6GT2002-0JE60) versions ant\u00e9rieures \u00e0 V2.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SICAM GridEdge Essential Intel (6MD7881-2AA40) versions ant\u00e9rieures \u00e0 V2.6.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal V16 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PDM toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Spectrum Power 4 toutes versions using Shared HIS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC NET PC Software V16 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV540 H (6GF3540-0GE10) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF360R (6GT2801-5BA30) versions ant\u00e9rieures \u00e0 V2.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 (TIA Portal) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINUMERIK Edge versions ant\u00e9rieures \u00e0 V3.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE LPE9403 (6GK5998-3GS00-2AC2) versions ant\u00e9rieures \u00e0 V2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Spectrum Power MGMS toutes versions using Shared HIS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200SP Open Controller (incl. SIPLUS variants) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter V13.2 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0) versions ant\u00e9rieures \u00e0 V1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 (6GK5615-0AA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M874-3 (6GK5874-3AA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM ROX Series toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF185C (6GT2002-0JE10) versions ant\u00e9rieures \u00e0 V2.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM853-1 (RoW) (6GK5853-2EA00-2AA1) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "EN100 Ethernet module PROFINET IO variant toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-PLCSIM Advanced toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEMA Remote Connect Server versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Logon toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M874-2 (6GK5874-2AA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV550 S (6GF3550-0CD10) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV550 H (6GF3550-0GE10) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIM 1531 IRC (6GK7543-1MX00-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET CP 343-1 Advanced (6AG1343-1GX31-4XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix SAML Module (Mendix 8 compatible) versions ant\u00e9rieures \u00e0 2.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "APOGEE PXC Modular (P2 Ethernet) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter V13.3 versions ant\u00e9rieures \u00e0 V13.3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Active Workspace V6.0 versions ant\u00e9rieures \u00e0 V6.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2) toutes versions versions ant\u00e9rieures \u00e0 V2.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix SAML Module (Mendix 7 compatible) versions ant\u00e9rieures \u00e0 1.16.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "EN100 Ethernet module DNP3 IP variant toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Industrial Edge - PROFINET IO Connector toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM ROS Series toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal V17 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TALON TC Modular (BACnet) versions ant\u00e9rieures \u00e0 V3.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS 7 TeleControl toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "APOGEE PXC Compact (BACnet) versions ant\u00e9rieures \u00e0 V3.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM856-1 (NAM) (6GK5856-2EA00-3BA1) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF685R (6GT2811-6CA10) versions ant\u00e9rieures \u00e0 V4.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEMA Server V14 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2) toutes versions versions ant\u00e9rieures \u00e0 V2.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF680R (6GT2811-6AA10) versions ant\u00e9rieures \u00e0 V4.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV560 U (6GF3560-0LE10) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Industrial Edge - SIMATIC S7 Connector App versions ant\u00e9rieures \u00e0 V1.7.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEC INS toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2) toutes versions versions ant\u00e9rieures \u00e0 V2.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Administrator toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TeleControl Server Basic V3 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINAUT ST7CC toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC NET PC Software V17 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Spectrum Power 7 toutes versions using Shared HIS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV560 X (6GF3560-0HE10) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 Software Controller (incl. F) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEMA Remote Connect Server versions ant\u00e9rieures \u00e0 3.0 SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Industrial Edge - OPC UA Connector toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Active Workspace V5.2 versions ant\u00e9rieures \u00e0 V5.2.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2) toutes versions versions ant\u00e9rieures \u00e0 V2.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEC NMS toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix SAML Module (Mendix 9 compatible) versions ant\u00e9rieures \u00e0 3.2.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter V14.0 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF615R (6GT2811-6CC10) versions ant\u00e9rieures \u00e0 V4.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF186CI (6GT2002-0JE50) versions ant\u00e9rieures \u00e0 V2.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2) versions ant\u00e9rieures \u00e0 V6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1628 (6GK1162-8AA00) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SICAM GridEdge Essential with GDS Intel (6MD7881-2AA20) versions ant\u00e9rieures \u00e0 V2.6.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter V13.1 versions ant\u00e9rieures \u00e0 V13.1.0.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2) toutes versions versions ant\u00e9rieures \u00e0 V2.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV540 S (6GF3540-0CD10) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM NMS toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-32285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32285"
    },
    {
      "name": "CVE-2022-32286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32286"
    },
    {
      "name": "CVE-2021-45960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
    },
    {
      "name": "CVE-2021-20317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20317"
    },
    {
      "name": "CVE-2022-32258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32258"
    },
    {
      "name": "CVE-2021-41091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41091"
    },
    {
      "name": "CVE-2021-22925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
    },
    {
      "name": "CVE-2022-30231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30231"
    },
    {
      "name": "CVE-2021-33196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
    },
    {
      "name": "CVE-2022-32254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32254"
    },
    {
      "name": "CVE-2022-22823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
    },
    {
      "name": "CVE-2022-32145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32145"
    },
    {
      "name": "CVE-2022-32259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32259"
    },
    {
      "name": "CVE-2022-32262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32262"
    },
    {
      "name": "CVE-2017-9947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9947"
    },
    {
      "name": "CVE-2022-32255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32255"
    },
    {
      "name": "CVE-2020-27304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27304"
    },
    {
      "name": "CVE-2022-25315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
    },
    {
      "name": "CVE-2022-22822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
    },
    {
      "name": "CVE-2022-32252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32252"
    },
    {
      "name": "CVE-2021-22924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
    },
    {
      "name": "CVE-2022-25313",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25313"
    },
    {
      "name": "CVE-2021-39275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
    },
    {
      "name": "CVE-2021-37182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37182"
    },
    {
      "name": "CVE-2020-9272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9272"
    },
    {
      "name": "CVE-2021-39293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
    },
    {
      "name": "CVE-2021-33910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
    },
    {
      "name": "CVE-2022-23852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
    },
    {
      "name": "CVE-2022-22825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
    },
    {
      "name": "CVE-2022-25314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25314"
    },
    {
      "name": "CVE-2022-23990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
    },
    {
      "name": "CVE-2022-26476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26476"
    },
    {
      "name": "CVE-2022-25235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
    },
    {
      "name": "CVE-2022-0847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
    },
    {
      "name": "CVE-2022-30228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30228"
    },
    {
      "name": "CVE-2021-46143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
    },
    {
      "name": "CVE-2021-41092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41092"
    },
    {
      "name": "CVE-2022-32251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32251"
    },
    {
      "name": "CVE-2021-34798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
    },
    {
      "name": "CVE-2021-36221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
    },
    {
      "name": "CVE-2021-41089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41089"
    },
    {
      "name": "CVE-2022-30230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30230"
    },
    {
      "name": "CVE-2020-9273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9273"
    },
    {
      "name": "CVE-2022-30229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30229"
    },
    {
      "name": "CVE-2022-22827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
    },
    {
      "name": "CVE-2022-29034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29034"
    },
    {
      "name": "CVE-2022-30937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30937"
    },
    {
      "name": "CVE-2022-25236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
    },
    {
      "name": "CVE-2022-0778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
    },
    {
      "name": "CVE-2022-27219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27219"
    },
    {
      "name": "CVE-2022-27221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27221"
    },
    {
      "name": "CVE-2022-22826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
    },
    {
      "name": "CVE-2022-31619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31619"
    },
    {
      "name": "CVE-2022-32261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32261"
    },
    {
      "name": "CVE-2022-32260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32260"
    },
    {
      "name": "CVE-2021-40438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
    },
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    },
    {
      "name": "CVE-2022-22824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
    },
    {
      "name": "CVE-2022-27220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27220"
    },
    {
      "name": "CVE-2022-31465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31465"
    },
    {
      "name": "CVE-2017-9946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9946"
    },
    {
      "name": "CVE-2021-41103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41103"
    },
    {
      "name": "CVE-2022-32253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32253"
    },
    {
      "name": "CVE-2022-32256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32256"
    },
    {
      "name": "CVE-2021-37209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37209"
    }
  ],
  "initial_release_date": "2022-06-15T00:00:00",
  "last_revision_date": "2022-06-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-547",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-06-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-148078 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-148078.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-220589 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-220589.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-988345 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-988345.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-484086 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-484086.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-330556 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-330556.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-145224 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-145224.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-685781 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-685781.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-693555 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-693555.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-911567 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-911567.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-401167 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-401167.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-764417 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-764417.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-712929 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-712929.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-679335 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-679335.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-388239 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-388239.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-631336 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-631336.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-740594 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-740594.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-222547 du 14 juin 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-222547.html"
    }
  ]
}
  CERTFR-2022-AVI-084
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans pkexec de PolicyKit sur Red Hat. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Red Hat Enterprise Linux versions 8 sans le correctif RHSA-2022:0267
- Red Hat Enterprise Linux version 8.4.0 Extended Update Support sans le correctif RHSA-2022:0266
- Red Hat Enterprise Linux versions 8.2.0 Extended Update Support sans le correctif RHSA-2022:0265
- Red Hat Enterprise Linux versions 8.1.0 Update Services for SAP Solutions, Advanced Update Support sans le correctif RHSA-2022:0268
- Red Hat Enterprise Linux versions 7 sans le correctif RHSA-2022:0274
- Red Hat Enterprise Linux versions 7.7 Update Services for SAP Solutions, Advanced Update Support sans le correctif RHSA-2022:0273
- Red Hat Enterprise Linux versions 7.6 Update Services for SAP Solutions, Advanced Update Support sans le correctif RHSA-2022:0271
- Red Hat Enterprise Linux versions 7.4 Advanced Update Support sans le correctif RHSA-2022:0272
- Red Hat Enterprise Linux versions 7.3 Advanced Update Support sans le correctif RHSA-2022:0270
- Red Hat Enterprise Linux versions 6 Extended Life-cycle Support sans le correctif RHSA-2022:0269
L'éditeur ne propose pas de correctif pour les versions Red Hat suivantes :
- Red Hat Virtualization 4 for Red Hat Enterprise Linux 8
- Red Hat Virtualization 4 for Red Hat Enterprise Linux 7
Se référer au bulletin de sécurité de l'éditeur dans la section Documentation pour obtenir des informations sur une mesure de contournement basée sur PolicyKit et à appliquer au cas où l'installation du correctif n'est pas possible.
| Vendor | Product | Description | 
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cul\u003e \u003cli\u003eRed Hat Enterprise Linux versions 8 sans le correctif RHSA-2022:0267\u003c/li\u003e \u003cli\u003eRed Hat Enterprise Linux version 8.4.0 Extended Update Support sans le correctif RHSA-2022:0266\u003c/li\u003e \u003cli\u003eRed Hat Enterprise Linux versions 8.2.0 Extended Update Support sans le correctif RHSA-2022:0265\u003c/li\u003e \u003cli\u003eRed Hat Enterprise Linux versions 8.1.0 Update Services for SAP Solutions, Advanced Update Support sans le correctif RHSA-2022:0268\u003c/li\u003e \u003cli\u003eRed Hat Enterprise Linux versions 7 sans le correctif RHSA-2022:0274\u003c/li\u003e \u003cli\u003eRed Hat Enterprise Linux versions 7.7 Update Services for SAP Solutions, Advanced Update Support sans le correctif RHSA-2022:0273\u003c/li\u003e \u003cli\u003eRed Hat Enterprise Linux versions 7.6 Update Services for SAP Solutions, Advanced Update Support sans le correctif RHSA-2022:0271\u003c/li\u003e \u003cli\u003eRed Hat Enterprise Linux versions 7.4 Advanced Update Support sans le correctif RHSA-2022:0272\u003c/li\u003e \u003cli\u003eRed Hat Enterprise Linux versions 7.3 Advanced Update Support sans le correctif RHSA-2022:0270\u003c/li\u003e \u003cli\u003eRed Hat Enterprise Linux versions 6 Extended Life-cycle Support sans le correctif RHSA-2022:0269\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eL\u0027\u00e9diteur ne propose pas de correctif pour les versions Red Hat suivantes :\u003c/p\u003e \u003cul\u003e \u003cli\u003eRed Hat Virtualization 4 for Red Hat Enterprise Linux 8\u003c/li\u003e \u003cli\u003eRed Hat Virtualization 4 for Red Hat Enterprise Linux 7\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur dans la section Documentation pour obtenir des informations sur une mesure de contournement bas\u00e9e sur PolicyKit et \u00e0 appliquer au cas o\u00f9 l\u0027installation du correctif n\u0027est pas possible.\u003c/p\u003e ",
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    }
  ],
  "initial_release_date": "2022-01-27T00:00:00",
  "last_revision_date": "2022-01-27T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-084",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-01-27T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans pkexec de PolicyKit sur Red Hat.\nElle permet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans pkexec de PolicyKit sur Red Hat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSB-2022-001 du 25 janvier 2022",
      "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
    }
  ]
}
  rhsa-2022:0269
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0269",
        "url": "https://access.redhat.com/errata/RHSA-2022:0269"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0269.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:13+00:00",
      "generator": {
        "date": "2025-10-09T21:42:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0269",
      "initial_release_date": "2022-01-25T18:21:43+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:21:43+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:21:43+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
                  "product_id": "6Server-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.96-11.el6_10.2.src",
                "product": {
                  "name": "polkit-0:0.96-11.el6_10.2.src",
                  "product_id": "polkit-0:0.96-11.el6_10.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.96-11.el6_10.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.96-11.el6_10.2.s390",
                "product": {
                  "name": "polkit-0:0.96-11.el6_10.2.s390",
                  "product_id": "polkit-0:0.96-11.el6_10.2.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.96-11.el6_10.2?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.96-11.el6_10.2.s390",
                "product": {
                  "name": "polkit-devel-0:0.96-11.el6_10.2.s390",
                  "product_id": "polkit-devel-0:0.96-11.el6_10.2.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.96-11.el6_10.2?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390",
                "product": {
                  "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390",
                  "product_id": "polkit-debuginfo-0:0.96-11.el6_10.2.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.96-11.el6_10.2?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.96-11.el6_10.2.s390x",
                "product": {
                  "name": "polkit-0:0.96-11.el6_10.2.s390x",
                  "product_id": "polkit-0:0.96-11.el6_10.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.96-11.el6_10.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.96-11.el6_10.2.s390x",
                "product": {
                  "name": "polkit-devel-0:0.96-11.el6_10.2.s390x",
                  "product_id": "polkit-devel-0:0.96-11.el6_10.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.96-11.el6_10.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.96-11.el6_10.2.s390x",
                "product": {
                  "name": "polkit-docs-0:0.96-11.el6_10.2.s390x",
                  "product_id": "polkit-docs-0:0.96-11.el6_10.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.96-11.el6_10.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
                "product": {
                  "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
                  "product_id": "polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.96-11.el6_10.2?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.96-11.el6_10.2.x86_64",
                "product": {
                  "name": "polkit-0:0.96-11.el6_10.2.x86_64",
                  "product_id": "polkit-0:0.96-11.el6_10.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.96-11.el6_10.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.96-11.el6_10.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.96-11.el6_10.2.x86_64",
                  "product_id": "polkit-devel-0:0.96-11.el6_10.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.96-11.el6_10.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.96-11.el6_10.2.x86_64",
                "product": {
                  "name": "polkit-docs-0:0.96-11.el6_10.2.x86_64",
                  "product_id": "polkit-docs-0:0.96-11.el6_10.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.96-11.el6_10.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.96-11.el6_10.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.96-11.el6_10.2.i686",
                "product": {
                  "name": "polkit-0:0.96-11.el6_10.2.i686",
                  "product_id": "polkit-0:0.96-11.el6_10.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.96-11.el6_10.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.96-11.el6_10.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.96-11.el6_10.2.i686",
                  "product_id": "polkit-devel-0:0.96-11.el6_10.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.96-11.el6_10.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.96-11.el6_10.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.96-11.el6_10.2.i686",
                  "product_id": "polkit-debuginfo-0:0.96-11.el6_10.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.96-11.el6_10.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.96-11.el6_10.2.i686",
                "product": {
                  "name": "polkit-docs-0:0.96-11.el6_10.2.i686",
                  "product_id": "polkit-docs-0:0.96-11.el6_10.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.96-11.el6_10.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
                "product": {
                  "name": "polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
                  "product_id": "polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-desktop-policy@0.96-11.el6_10.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.96-11.el6_10.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-0:0.96-11.el6_10.2.i686"
        },
        "product_reference": "polkit-0:0.96-11.el6_10.2.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.96-11.el6_10.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390"
        },
        "product_reference": "polkit-0:0.96-11.el6_10.2.s390",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.96-11.el6_10.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390x"
        },
        "product_reference": "polkit-0:0.96-11.el6_10.2.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.96-11.el6_10.2.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-0:0.96-11.el6_10.2.src"
        },
        "product_reference": "polkit-0:0.96-11.el6_10.2.src",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.96-11.el6_10.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-0:0.96-11.el6_10.2.x86_64"
        },
        "product_reference": "polkit-0:0.96-11.el6_10.2.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.96-11.el6_10.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.96-11.el6_10.2.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.96-11.el6_10.2.s390",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.96-11.el6_10.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-desktop-policy-0:0.96-11.el6_10.2.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-desktop-policy-0:0.96-11.el6_10.2.noarch"
        },
        "product_reference": "polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.96-11.el6_10.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.i686"
        },
        "product_reference": "polkit-devel-0:0.96-11.el6_10.2.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.96-11.el6_10.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390"
        },
        "product_reference": "polkit-devel-0:0.96-11.el6_10.2.s390",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.96-11.el6_10.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390x"
        },
        "product_reference": "polkit-devel-0:0.96-11.el6_10.2.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.96-11.el6_10.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.96-11.el6_10.2.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.96-11.el6_10.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.i686"
        },
        "product_reference": "polkit-docs-0:0.96-11.el6_10.2.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.96-11.el6_10.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.s390x"
        },
        "product_reference": "polkit-docs-0:0.96-11.el6_10.2.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.96-11.el6_10.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.x86_64"
        },
        "product_reference": "polkit-docs-0:0.96-11.el6_10.2.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS:polkit-0:0.96-11.el6_10.2.i686",
          "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390",
          "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390x",
          "6Server-ELS:polkit-0:0.96-11.el6_10.2.src",
          "6Server-ELS:polkit-0:0.96-11.el6_10.2.x86_64",
          "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.i686",
          "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390",
          "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
          "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
          "6Server-ELS:polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
          "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.i686",
          "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390",
          "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390x",
          "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.x86_64",
          "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.i686",
          "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.s390x",
          "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:21:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.src",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0269"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.src",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.src",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022_0266
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0266",
        "url": "https://access.redhat.com/errata/RHSA-2022:0266"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0266.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2024-11-15T10:44:53+00:00",
      "generator": {
        "date": "2024-11-15T10:44:53+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2022:0266",
      "initial_release_date": "2022-01-25T18:15:24+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:15:24+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:15:24+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:44:53+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
                  "product_id": "BaseOS-8.4.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.4::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_4.2.src",
                "product": {
                  "name": "polkit-0:0.115-11.el8_4.2.src",
                  "product_id": "polkit-0:0.115-11.el8_4.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_4.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-devel-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-libs-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-devel-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-libs-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-devel-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-libs-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_4.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_4.2.i686",
                  "product_id": "polkit-devel-0:0.115-11.el8_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_4.2.i686",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_4.2.i686",
                  "product_id": "polkit-libs-0:0.115-11.el8_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_4.2.i686",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_4.2.i686",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_4.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_4.2.i686",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_4.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-devel-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-libs-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.115-11.el8_4.2.noarch",
                "product": {
                  "name": "polkit-docs-0:0.115-11.el8_4.2.noarch",
                  "product_id": "polkit-docs-0:0.115-11.el8_4.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.115-11.el8_4.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_4.2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.src"
        },
        "product_reference": "polkit-0:0.115-11.el8_4.2.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_4.2.i686",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.i686"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_4.2.i686",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.i686"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_4.2.i686",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.115-11.el8_4.2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-docs-0:0.115-11.el8_4.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.115-11.el8_4.2.noarch",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.i686"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_4.2.i686",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.src",
          "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.x86_64",
          "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.i686",
          "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
          "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.i686",
          "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
          "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.i686",
          "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.x86_64",
          "BaseOS-8.4.0.Z.EUS:polkit-docs-0:0.115-11.el8_4.2.noarch",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.i686",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.x86_64",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:15:24+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.src",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-docs-0:0.115-11.el8_4.2.noarch",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0266"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.src",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-docs-0:0.115-11.el8_4.2.noarch",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.src",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-docs-0:0.115-11.el8_4.2.noarch",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022_0270
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0270",
        "url": "https://access.redhat.com/errata/RHSA-2022:0270"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0270.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2024-11-15T10:44:53+00:00",
      "generator": {
        "date": "2024-11-15T10:44:53+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2022:0270",
      "initial_release_date": "2022-01-25T18:21:13+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:21:13+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:21:13+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:44:53+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                  "product_id": "7Server-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_3.1.src",
                "product": {
                  "name": "polkit-0:0.112-12.el7_3.1.src",
                  "product_id": "polkit-0:0.112-12.el7_3.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_3.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_3.1.x86_64",
                "product": {
                  "name": "polkit-0:0.112-12.el7_3.1.x86_64",
                  "product_id": "polkit-0:0.112-12.el7_3.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_3.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-12.el7_3.1.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.112-12.el7_3.1.x86_64",
                  "product_id": "polkit-devel-0:0.112-12.el7_3.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-12.el7_3.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
                  "product_id": "polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-12.el7_3.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_3.1.i686",
                "product": {
                  "name": "polkit-0:0.112-12.el7_3.1.i686",
                  "product_id": "polkit-0:0.112-12.el7_3.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_3.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-12.el7_3.1.i686",
                "product": {
                  "name": "polkit-devel-0:0.112-12.el7_3.1.i686",
                  "product_id": "polkit-devel-0:0.112-12.el7_3.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-12.el7_3.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-12.el7_3.1.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-12.el7_3.1.i686",
                  "product_id": "polkit-debuginfo-0:0.112-12.el7_3.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-12.el7_3.1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.112-12.el7_3.1.noarch",
                "product": {
                  "name": "polkit-docs-0:0.112-12.el7_3.1.noarch",
                  "product_id": "polkit-docs-0:0.112-12.el7_3.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.112-12.el7_3.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.i686"
        },
        "product_reference": "polkit-0:0.112-12.el7_3.1.i686",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_3.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.src"
        },
        "product_reference": "polkit-0:0.112-12.el7_3.1.src",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-12.el7_3.1.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-12.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-12.el7_3.1.i686",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-12.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-12.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-12.el7_3.1.i686",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-12.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-12.el7_3.1.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-12.el7_3.1.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-docs-0:0.112-12.el7_3.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-12.el7_3.1.noarch",
        "relates_to_product_reference": "7Server-7.3.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.i686",
          "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.src",
          "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.x86_64",
          "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.i686",
          "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
          "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.i686",
          "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.x86_64",
          "7Server-7.3.AUS:polkit-docs-0:0.112-12.el7_3.1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:21:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.src",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-docs-0:0.112-12.el7_3.1.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0270"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.src",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-docs-0:0.112-12.el7_3.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.src",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-docs-0:0.112-12.el7_3.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022_0540
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\n* aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417)\n\n* kernel: fs_context: heap overflow in legacy parameter handling (CVE-2022-0185)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Rebased wget package and its dependencies for the same version shipped with recent RHEL. (BZ#2030082)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0540",
        "url": "https://access.redhat.com/errata/RHSA-2022:0540"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "external",
        "summary": "2030082",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030082"
      },
      {
        "category": "external",
        "summary": "2034685",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034685"
      },
      {
        "category": "external",
        "summary": "2034813",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
      },
      {
        "category": "external",
        "summary": "2040358",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040358"
      },
      {
        "category": "external",
        "summary": "2041489",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0540.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.4.10-1]",
    "tracking": {
      "current_release_date": "2024-11-15T10:47:20+00:00",
      "generator": {
        "date": "2024-11-15T10:47:20+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2022:0540",
      "initial_release_date": "2022-02-15T11:01:25+00:00",
      "revision_history": [
        {
          "date": "2022-02-15T11:01:25+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-02-15T11:01:25+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:47:20+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
                "product": {
                  "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
                  "product_id": "8Base-RHV-Hypervisor-4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
                "product": {
                  "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
                  "product_id": "8Base-RHV-HypervisorBuild-4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wget-0:1.19.5-10.el8.x86_64",
                "product": {
                  "name": "wget-0:1.19.5-10.el8.x86_64",
                  "product_id": "wget-0:1.19.5-10.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wget-debugsource-0:1.19.5-10.el8.x86_64",
                "product": {
                  "name": "wget-debugsource-0:1.19.5-10.el8.x86_64",
                  "product_id": "wget-debugsource-0:1.19.5-10.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-10.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wget-debuginfo-0:1.19.5-10.el8.x86_64",
                "product": {
                  "name": "wget-debuginfo-0:1.19.5-10.el8.x86_64",
                  "product_id": "wget-debuginfo-0:1.19.5-10.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-10.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libmetalink-0:0.1.3-7.el8.x86_64",
                "product": {
                  "name": "libmetalink-0:0.1.3-7.el8.x86_64",
                  "product_id": "libmetalink-0:0.1.3-7.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libmetalink@0.1.3-7.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libmetalink-devel-0:0.1.3-7.el8.x86_64",
                "product": {
                  "name": "libmetalink-devel-0:0.1.3-7.el8.x86_64",
                  "product_id": "libmetalink-devel-0:0.1.3-7.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libmetalink-devel@0.1.3-7.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
                "product": {
                  "name": "libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
                  "product_id": "libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libmetalink-debugsource@0.1.3-7.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
                "product": {
                  "name": "libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
                  "product_id": "libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libmetalink-debuginfo@0.1.3-7.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.10-1.el8ev?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.4.10-1.el8ev?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
                "product": {
                  "name": "redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
                  "product_id": "redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.10-202202081536_8.5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wget-0:1.19.5-10.el8.src",
                "product": {
                  "name": "wget-0:1.19.5-10.el8.src",
                  "product_id": "wget-0:1.19.5-10.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libmetalink-0:0.1.3-7.el8.src",
                "product": {
                  "name": "libmetalink-0:0.1.3-7.el8.src",
                  "product_id": "libmetalink-0:0.1.3-7.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libmetalink@0.1.3-7.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
                  "product_id": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.10-1.el8ev?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
                "product": {
                  "name": "redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
                  "product_id": "redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.10-202202081536_8.5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch",
                  "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.10-1.el8ev?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmetalink-0:0.1.3-7.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src"
        },
        "product_reference": "libmetalink-0:0.1.3-7.el8.src",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmetalink-0:0.1.3-7.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64"
        },
        "product_reference": "libmetalink-0:0.1.3-7.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmetalink-debuginfo-0:0.1.3-7.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64"
        },
        "product_reference": "libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmetalink-debugsource-0:0.1.3-7.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64"
        },
        "product_reference": "libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmetalink-devel-0:0.1.3-7.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64"
        },
        "product_reference": "libmetalink-devel-0:0.1.3-7.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.4.10-202202081536_8.5.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wget-0:1.19.5-10.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src"
        },
        "product_reference": "wget-0:1.19.5-10.el8.src",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wget-0:1.19.5-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64"
        },
        "product_reference": "wget-0:1.19.5-10.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wget-debuginfo-0:1.19.5-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64"
        },
        "product_reference": "wget-debuginfo-0:1.19.5-10.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wget-debugsource-0:1.19.5-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64"
        },
        "product_reference": "wget-debugsource-0:1.19.5-10.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-15T11:01:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0540"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Kirill Tkhai"
          ],
          "organization": "Virtuozzo Kernel team"
        }
      ],
      "cve": "CVE-2021-4155",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "discovery_date": "2021-12-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2034813"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4155"
        },
        {
          "category": "external",
          "summary": "RHBZ#2034813",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
        }
      ],
      "release_date": "2022-01-10T06:36:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-15T11:01:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0540"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script  (which resets \"0\" with  XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6  ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6  ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n     # yum install -y systemtap systemtap-runtime\n     # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n    # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n    # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
    },
    {
      "cve": "CVE-2021-45417",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-01-16T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2041489"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer overflow vulnerability in the base64 functions of AIDE, an advanced intrusion detection system. An attacker could crash the program and possibly execute arbitrary code through large (\u003c16k) extended file attributes or ACL.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "aide: heap-based buffer overflow on outputs larger than B64_BUF",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-45417"
        },
        {
          "category": "external",
          "summary": "RHBZ#2041489",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45417",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-45417"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45417",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45417"
        }
      ],
      "release_date": "2022-01-20T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-15T11:01:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0540"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "aide: heap-based buffer overflow on outputs larger than B64_BUF"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "William Liu"
          ],
          "organization": "willsroot@protonmail.com"
        },
        {
          "names": [
            "Jamie Hill-Daniel"
          ],
          "organization": "jamie@hill-daniel.co.uk"
        },
        {
          "names": [
            "Isaac Badipe"
          ],
          "organization": "isaac.badipe@gmail.com"
        },
        {
          "names": [
            "Alec Petridis"
          ],
          "organization": "alecthechop@gmail.com"
        },
        {
          "names": [
            "Hrvoje Mi\u0161eti\u0107"
          ],
          "organization": "misetichrvoje@gmail.com"
        },
        {
          "names": [
            "Philip Papurt"
          ],
          "organization": "g@gnk.io"
        }
      ],
      "cve": "CVE-2022-0185",
      "cwe": {
        "id": "CWE-191",
        "name": "Integer Underflow (Wrap or Wraparound)"
      },
      "discovery_date": "2022-01-13T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2040358"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fs_context: heap overflow in legacy parameter handling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 8.4 GA onwards. Previous Red Hat Enterprise Linux versions are not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0185"
        },
        {
          "category": "external",
          "summary": "RHBZ#2040358",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040358"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0185",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0185"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0185",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0185"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2"
        },
        {
          "category": "external",
          "summary": "https://github.com/Crusaders-of-Rust/CVE-2022-0185",
          "url": "https://github.com/Crusaders-of-Rust/CVE-2022-0185"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/7",
          "url": "https://www.openwall.com/lists/oss-security/2022/01/18/7"
        },
        {
          "category": "external",
          "summary": "https://www.willsroot.io/2022/01/cve-2022-0185.html",
          "url": "https://www.willsroot.io/2022/01/cve-2022-0185.html"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-18T18:41:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-15T11:01:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0540"
        },
        {
          "category": "workaround",
          "details": "On non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2024-08-21T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fs_context: heap overflow in legacy parameter handling"
    }
  ]
}
  RHSA-2022:0265
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0265",
        "url": "https://access.redhat.com/errata/RHSA-2022:0265"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0265.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:12+00:00",
      "generator": {
        "date": "2025-10-09T21:42:12+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0265",
      "initial_release_date": "2022-01-25T18:04:10+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:04:10+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:04:10+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:12+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                  "product_id": "BaseOS-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_2.2.src",
                "product": {
                  "name": "polkit-0:0.115-11.el8_2.2.src",
                  "product_id": "polkit-0:0.115-11.el8_2.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_2.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-devel-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-libs-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-devel-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-libs-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-devel-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-libs-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_2.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_2.2.i686",
                  "product_id": "polkit-devel-0:0.115-11.el8_2.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_2.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_2.2.i686",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_2.2.i686",
                  "product_id": "polkit-libs-0:0.115-11.el8_2.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_2.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_2.2.i686",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_2.2.i686",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_2.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_2.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_2.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_2.2.i686",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_2.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_2.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_2.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-devel-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-libs-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.115-11.el8_2.2.noarch",
                "product": {
                  "name": "polkit-docs-0:0.115-11.el8_2.2.noarch",
                  "product_id": "polkit-docs-0:0.115-11.el8_2.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.115-11.el8_2.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_2.2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.src"
        },
        "product_reference": "polkit-0:0.115-11.el8_2.2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_2.2.i686",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.i686"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_2.2.i686",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.i686"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_2.2.i686",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.115-11.el8_2.2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-docs-0:0.115-11.el8_2.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.115-11.el8_2.2.noarch",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.i686"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_2.2.i686",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.src",
          "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.x86_64",
          "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.i686",
          "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
          "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.i686",
          "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
          "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.i686",
          "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.x86_64",
          "BaseOS-8.2.0.Z.EUS:polkit-docs-0:0.115-11.el8_2.2.noarch",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.i686",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.x86_64",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:04:10+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.src",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-docs-0:0.115-11.el8_2.2.noarch",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0265"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.src",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-docs-0:0.115-11.el8_2.2.noarch",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.src",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-docs-0:0.115-11.el8_2.2.noarch",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022_0272
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0272",
        "url": "https://access.redhat.com/errata/RHSA-2022:0272"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0272.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2024-11-15T10:44:38+00:00",
      "generator": {
        "date": "2024-11-15T10:44:38+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2022:0272",
      "initial_release_date": "2022-01-25T18:30:35+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:30:35+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:30:35+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:44:38+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                  "product_id": "7Server-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_4.2.src",
                "product": {
                  "name": "polkit-0:0.112-12.el7_4.2.src",
                  "product_id": "polkit-0:0.112-12.el7_4.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_4.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_4.2.x86_64",
                "product": {
                  "name": "polkit-0:0.112-12.el7_4.2.x86_64",
                  "product_id": "polkit-0:0.112-12.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-12.el7_4.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.112-12.el7_4.2.x86_64",
                  "product_id": "polkit-devel-0:0.112-12.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-12.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-12.el7_4.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_4.2.i686",
                "product": {
                  "name": "polkit-0:0.112-12.el7_4.2.i686",
                  "product_id": "polkit-0:0.112-12.el7_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-12.el7_4.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.112-12.el7_4.2.i686",
                  "product_id": "polkit-devel-0:0.112-12.el7_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-12.el7_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-12.el7_4.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-12.el7_4.2.i686",
                  "product_id": "polkit-debuginfo-0:0.112-12.el7_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-12.el7_4.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.112-12.el7_4.2.noarch",
                "product": {
                  "name": "polkit-docs-0:0.112-12.el7_4.2.noarch",
                  "product_id": "polkit-docs-0:0.112-12.el7_4.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.112-12.el7_4.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_4.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.i686"
        },
        "product_reference": "polkit-0:0.112-12.el7_4.2.i686",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_4.2.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.src"
        },
        "product_reference": "polkit-0:0.112-12.el7_4.2.src",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.x86_64"
        },
        "product_reference": "polkit-0:0.112-12.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-12.el7_4.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-12.el7_4.2.i686",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-12.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-12.el7_4.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.i686"
        },
        "product_reference": "polkit-devel-0:0.112-12.el7_4.2.i686",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-12.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-12.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-12.el7_4.2.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-docs-0:0.112-12.el7_4.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-12.el7_4.2.noarch",
        "relates_to_product_reference": "7Server-7.4.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.i686",
          "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.src",
          "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.x86_64",
          "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.i686",
          "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
          "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.i686",
          "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.x86_64",
          "7Server-7.4.AUS:polkit-docs-0:0.112-12.el7_4.2.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:30:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.src",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-docs-0:0.112-12.el7_4.2.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0272"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.src",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-docs-0:0.112-12.el7_4.2.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.src",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-docs-0:0.112-12.el7_4.2.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  RHSA-2022:0269
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0269",
        "url": "https://access.redhat.com/errata/RHSA-2022:0269"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0269.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:13+00:00",
      "generator": {
        "date": "2025-10-09T21:42:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0269",
      "initial_release_date": "2022-01-25T18:21:43+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:21:43+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:21:43+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
                  "product_id": "6Server-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.96-11.el6_10.2.src",
                "product": {
                  "name": "polkit-0:0.96-11.el6_10.2.src",
                  "product_id": "polkit-0:0.96-11.el6_10.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.96-11.el6_10.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.96-11.el6_10.2.s390",
                "product": {
                  "name": "polkit-0:0.96-11.el6_10.2.s390",
                  "product_id": "polkit-0:0.96-11.el6_10.2.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.96-11.el6_10.2?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.96-11.el6_10.2.s390",
                "product": {
                  "name": "polkit-devel-0:0.96-11.el6_10.2.s390",
                  "product_id": "polkit-devel-0:0.96-11.el6_10.2.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.96-11.el6_10.2?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390",
                "product": {
                  "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390",
                  "product_id": "polkit-debuginfo-0:0.96-11.el6_10.2.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.96-11.el6_10.2?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.96-11.el6_10.2.s390x",
                "product": {
                  "name": "polkit-0:0.96-11.el6_10.2.s390x",
                  "product_id": "polkit-0:0.96-11.el6_10.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.96-11.el6_10.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.96-11.el6_10.2.s390x",
                "product": {
                  "name": "polkit-devel-0:0.96-11.el6_10.2.s390x",
                  "product_id": "polkit-devel-0:0.96-11.el6_10.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.96-11.el6_10.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.96-11.el6_10.2.s390x",
                "product": {
                  "name": "polkit-docs-0:0.96-11.el6_10.2.s390x",
                  "product_id": "polkit-docs-0:0.96-11.el6_10.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.96-11.el6_10.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
                "product": {
                  "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
                  "product_id": "polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.96-11.el6_10.2?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.96-11.el6_10.2.x86_64",
                "product": {
                  "name": "polkit-0:0.96-11.el6_10.2.x86_64",
                  "product_id": "polkit-0:0.96-11.el6_10.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.96-11.el6_10.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.96-11.el6_10.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.96-11.el6_10.2.x86_64",
                  "product_id": "polkit-devel-0:0.96-11.el6_10.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.96-11.el6_10.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.96-11.el6_10.2.x86_64",
                "product": {
                  "name": "polkit-docs-0:0.96-11.el6_10.2.x86_64",
                  "product_id": "polkit-docs-0:0.96-11.el6_10.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.96-11.el6_10.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.96-11.el6_10.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.96-11.el6_10.2.i686",
                "product": {
                  "name": "polkit-0:0.96-11.el6_10.2.i686",
                  "product_id": "polkit-0:0.96-11.el6_10.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.96-11.el6_10.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.96-11.el6_10.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.96-11.el6_10.2.i686",
                  "product_id": "polkit-devel-0:0.96-11.el6_10.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.96-11.el6_10.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.96-11.el6_10.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.96-11.el6_10.2.i686",
                  "product_id": "polkit-debuginfo-0:0.96-11.el6_10.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.96-11.el6_10.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.96-11.el6_10.2.i686",
                "product": {
                  "name": "polkit-docs-0:0.96-11.el6_10.2.i686",
                  "product_id": "polkit-docs-0:0.96-11.el6_10.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.96-11.el6_10.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
                "product": {
                  "name": "polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
                  "product_id": "polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-desktop-policy@0.96-11.el6_10.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.96-11.el6_10.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-0:0.96-11.el6_10.2.i686"
        },
        "product_reference": "polkit-0:0.96-11.el6_10.2.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.96-11.el6_10.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390"
        },
        "product_reference": "polkit-0:0.96-11.el6_10.2.s390",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.96-11.el6_10.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390x"
        },
        "product_reference": "polkit-0:0.96-11.el6_10.2.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.96-11.el6_10.2.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-0:0.96-11.el6_10.2.src"
        },
        "product_reference": "polkit-0:0.96-11.el6_10.2.src",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.96-11.el6_10.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-0:0.96-11.el6_10.2.x86_64"
        },
        "product_reference": "polkit-0:0.96-11.el6_10.2.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.96-11.el6_10.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.96-11.el6_10.2.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.96-11.el6_10.2.s390",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.96-11.el6_10.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-desktop-policy-0:0.96-11.el6_10.2.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-desktop-policy-0:0.96-11.el6_10.2.noarch"
        },
        "product_reference": "polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.96-11.el6_10.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.i686"
        },
        "product_reference": "polkit-devel-0:0.96-11.el6_10.2.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.96-11.el6_10.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390"
        },
        "product_reference": "polkit-devel-0:0.96-11.el6_10.2.s390",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.96-11.el6_10.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390x"
        },
        "product_reference": "polkit-devel-0:0.96-11.el6_10.2.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.96-11.el6_10.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.96-11.el6_10.2.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.96-11.el6_10.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.i686"
        },
        "product_reference": "polkit-docs-0:0.96-11.el6_10.2.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.96-11.el6_10.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.s390x"
        },
        "product_reference": "polkit-docs-0:0.96-11.el6_10.2.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.96-11.el6_10.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.x86_64"
        },
        "product_reference": "polkit-docs-0:0.96-11.el6_10.2.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS:polkit-0:0.96-11.el6_10.2.i686",
          "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390",
          "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390x",
          "6Server-ELS:polkit-0:0.96-11.el6_10.2.src",
          "6Server-ELS:polkit-0:0.96-11.el6_10.2.x86_64",
          "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.i686",
          "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390",
          "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
          "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
          "6Server-ELS:polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
          "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.i686",
          "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390",
          "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390x",
          "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.x86_64",
          "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.i686",
          "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.s390x",
          "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:21:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.src",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0269"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.src",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.src",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  RHSA-2022:0273
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0273",
        "url": "https://access.redhat.com/errata/RHSA-2022:0273"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0273.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:14+00:00",
      "generator": {
        "date": "2025-10-09T21:42:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0273",
      "initial_release_date": "2022-01-25T19:07:00+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T19:07:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T19:07:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                  "product_id": "7Server-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                  "product_id": "7Server-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                  "product_id": "7Server-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-22.el7_7.2.src",
                "product": {
                  "name": "polkit-0:0.112-22.el7_7.2.src",
                  "product_id": "polkit-0:0.112-22.el7_7.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-22.el7_7.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-22.el7_7.2.x86_64",
                "product": {
                  "name": "polkit-0:0.112-22.el7_7.2.x86_64",
                  "product_id": "polkit-0:0.112-22.el7_7.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-22.el7_7.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
                  "product_id": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-22.el7_7.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-22.el7_7.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-22.el7_7.2.i686",
                "product": {
                  "name": "polkit-0:0.112-22.el7_7.2.i686",
                  "product_id": "polkit-0:0.112-22.el7_7.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-22.el7_7.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-22.el7_7.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.112-22.el7_7.2.i686",
                  "product_id": "polkit-devel-0:0.112-22.el7_7.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-22.el7_7.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
                  "product_id": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-22.el7_7.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.112-22.el7_7.2.noarch",
                "product": {
                  "name": "polkit-docs-0:0.112-22.el7_7.2.noarch",
                  "product_id": "polkit-docs-0:0.112-22.el7_7.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.112-22.el7_7.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-22.el7_7.2.ppc64le",
                "product": {
                  "name": "polkit-0:0.112-22.el7_7.2.ppc64le",
                  "product_id": "polkit-0:0.112-22.el7_7.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-22.el7_7.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-22.el7_7.2.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.112-22.el7_7.2.ppc64le",
                  "product_id": "polkit-devel-0:0.112-22.el7_7.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-22.el7_7.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-22.el7_7.2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.src"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.src",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-22.el7_7.2.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-22.el7_7.2.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.ppc64le"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.src"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-22.el7_7.2.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-docs-0:0.112-22.el7_7.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-22.el7_7.2.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.src"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.src",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-22.el7_7.2.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-22.el7_7.2.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.src",
          "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.AUS:polkit-docs-0:0.112-22.el7_7.2.noarch",
          "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.ppc64le",
          "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.src",
          "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
          "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.ppc64le",
          "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.E4S:polkit-docs-0:0.112-22.el7_7.2.noarch",
          "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.src",
          "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.TUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T19:07:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0273"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  RHSA-2022:0272
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0272",
        "url": "https://access.redhat.com/errata/RHSA-2022:0272"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0272.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:13+00:00",
      "generator": {
        "date": "2025-10-09T21:42:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0272",
      "initial_release_date": "2022-01-25T18:30:35+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:30:35+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:30:35+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                  "product_id": "7Server-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_4.2.src",
                "product": {
                  "name": "polkit-0:0.112-12.el7_4.2.src",
                  "product_id": "polkit-0:0.112-12.el7_4.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_4.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_4.2.x86_64",
                "product": {
                  "name": "polkit-0:0.112-12.el7_4.2.x86_64",
                  "product_id": "polkit-0:0.112-12.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-12.el7_4.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.112-12.el7_4.2.x86_64",
                  "product_id": "polkit-devel-0:0.112-12.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-12.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-12.el7_4.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_4.2.i686",
                "product": {
                  "name": "polkit-0:0.112-12.el7_4.2.i686",
                  "product_id": "polkit-0:0.112-12.el7_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-12.el7_4.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.112-12.el7_4.2.i686",
                  "product_id": "polkit-devel-0:0.112-12.el7_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-12.el7_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-12.el7_4.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-12.el7_4.2.i686",
                  "product_id": "polkit-debuginfo-0:0.112-12.el7_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-12.el7_4.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.112-12.el7_4.2.noarch",
                "product": {
                  "name": "polkit-docs-0:0.112-12.el7_4.2.noarch",
                  "product_id": "polkit-docs-0:0.112-12.el7_4.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.112-12.el7_4.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_4.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.i686"
        },
        "product_reference": "polkit-0:0.112-12.el7_4.2.i686",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_4.2.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.src"
        },
        "product_reference": "polkit-0:0.112-12.el7_4.2.src",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.x86_64"
        },
        "product_reference": "polkit-0:0.112-12.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-12.el7_4.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-12.el7_4.2.i686",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-12.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-12.el7_4.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.i686"
        },
        "product_reference": "polkit-devel-0:0.112-12.el7_4.2.i686",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-12.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-12.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-12.el7_4.2.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-docs-0:0.112-12.el7_4.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-12.el7_4.2.noarch",
        "relates_to_product_reference": "7Server-7.4.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.i686",
          "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.src",
          "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.x86_64",
          "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.i686",
          "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
          "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.i686",
          "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.x86_64",
          "7Server-7.4.AUS:polkit-docs-0:0.112-12.el7_4.2.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:30:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.src",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-docs-0:0.112-12.el7_4.2.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0272"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.src",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-docs-0:0.112-12.el7_4.2.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.src",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-docs-0:0.112-12.el7_4.2.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022:0265
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0265",
        "url": "https://access.redhat.com/errata/RHSA-2022:0265"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0265.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:12+00:00",
      "generator": {
        "date": "2025-10-09T21:42:12+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0265",
      "initial_release_date": "2022-01-25T18:04:10+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:04:10+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:04:10+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:12+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                  "product_id": "BaseOS-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_2.2.src",
                "product": {
                  "name": "polkit-0:0.115-11.el8_2.2.src",
                  "product_id": "polkit-0:0.115-11.el8_2.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_2.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-devel-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-libs-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-devel-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-libs-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-devel-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-libs-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_2.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_2.2.i686",
                  "product_id": "polkit-devel-0:0.115-11.el8_2.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_2.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_2.2.i686",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_2.2.i686",
                  "product_id": "polkit-libs-0:0.115-11.el8_2.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_2.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_2.2.i686",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_2.2.i686",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_2.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_2.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_2.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_2.2.i686",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_2.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_2.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_2.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-devel-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-libs-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.115-11.el8_2.2.noarch",
                "product": {
                  "name": "polkit-docs-0:0.115-11.el8_2.2.noarch",
                  "product_id": "polkit-docs-0:0.115-11.el8_2.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.115-11.el8_2.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_2.2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.src"
        },
        "product_reference": "polkit-0:0.115-11.el8_2.2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_2.2.i686",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.i686"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_2.2.i686",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.i686"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_2.2.i686",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.115-11.el8_2.2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-docs-0:0.115-11.el8_2.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.115-11.el8_2.2.noarch",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.i686"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_2.2.i686",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.src",
          "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.x86_64",
          "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.i686",
          "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
          "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.i686",
          "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
          "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.i686",
          "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.x86_64",
          "BaseOS-8.2.0.Z.EUS:polkit-docs-0:0.115-11.el8_2.2.noarch",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.i686",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.x86_64",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:04:10+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.src",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-docs-0:0.115-11.el8_2.2.noarch",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0265"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.src",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-docs-0:0.115-11.el8_2.2.noarch",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.src",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-docs-0:0.115-11.el8_2.2.noarch",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022_0443
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\n* samba: Active Directory (AD) domain user could become root on domain members (CVE-2020-25717)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0443",
        "url": "https://access.redhat.com/errata/RHSA-2022:0443"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2019672",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019672"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0443.json"
      }
    ],
    "title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.21",
    "tracking": {
      "current_release_date": "2024-11-15T10:46:38+00:00",
      "generator": {
        "date": "2024-11-15T10:46:38+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2022:0443",
      "initial_release_date": "2022-02-07T10:46:52+00:00",
      "revision_history": [
        {
          "date": "2022-02-07T10:46:52+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-02-07T10:46:52+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:46:38+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
                "product": {
                  "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
                  "product_id": "7Server-RHEV-4-HypervisorBuild-7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
                "product": {
                  "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
                  "product_id": "7Server-RHEV-4-Hypervisor-7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
                  "product_id": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.21-1.el7ev?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
                "product": {
                  "name": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
                  "product_id": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.21-20220126.0.el7_9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.21-1.el7ev?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch",
                  "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.21-1.el7ev?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
                  "product_id": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.21-20220126.0.el7_9?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
          "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
        "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
          "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "the Samba project"
          ]
        },
        {
          "names": [
            "Andrew Bartlett"
          ],
          "organization": "Catalyst and the Samba Team"
        }
      ],
      "cve": "CVE-2020-25717",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-03T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2019672"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "samba: Active Directory (AD) domain user could become root on domain members",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
        ],
        "known_not_affected": [
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-25717"
        },
        {
          "category": "external",
          "summary": "RHBZ#2019672",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019672"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25717",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-25717"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25717",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25717"
        },
        {
          "category": "external",
          "summary": "https://www.samba.org/samba/security/CVE-2020-25717.html",
          "url": "https://www.samba.org/samba/security/CVE-2020-25717.html"
        }
      ],
      "release_date": "2021-11-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-07T10:46:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0443"
        },
        {
          "category": "workaround",
          "details": "Setting \"gensec:require_pac=true\" in the smb.conf makes, due to a cache prime in winbind, the DOMAIN\\user lookup succeed, provided nss_winbind is in use, \u0027winbind use default domain = no\u0027 (the default) and no error paths are hit.  \n\nIt would be prudent to pre-create disabled users in Active Directory matching on all privileged names not held in Active Directory, eg \n~~~\n samba-tool user add root -H ldap://$SERVER -U$USERNAME%$PASSWORD --random-password\n samba-tool user add ubuntu -H ldap://$SERVER -U$USERNAME%$PASSWORD --random-password\n ~~~\n (repeat for eg all system users under 1000 in /etc/passwd or special to any other AD-connected services, eg perhaps \"admin\" for a web-app)",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "samba: Active Directory (AD) domain user could become root on domain members"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
        ],
        "known_not_affected": [
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-07T10:46:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0443"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022:0272
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0272",
        "url": "https://access.redhat.com/errata/RHSA-2022:0272"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0272.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:13+00:00",
      "generator": {
        "date": "2025-10-09T21:42:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0272",
      "initial_release_date": "2022-01-25T18:30:35+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:30:35+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:30:35+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
                  "product_id": "7Server-7.4.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_4.2.src",
                "product": {
                  "name": "polkit-0:0.112-12.el7_4.2.src",
                  "product_id": "polkit-0:0.112-12.el7_4.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_4.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_4.2.x86_64",
                "product": {
                  "name": "polkit-0:0.112-12.el7_4.2.x86_64",
                  "product_id": "polkit-0:0.112-12.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-12.el7_4.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.112-12.el7_4.2.x86_64",
                  "product_id": "polkit-devel-0:0.112-12.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-12.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-12.el7_4.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_4.2.i686",
                "product": {
                  "name": "polkit-0:0.112-12.el7_4.2.i686",
                  "product_id": "polkit-0:0.112-12.el7_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-12.el7_4.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.112-12.el7_4.2.i686",
                  "product_id": "polkit-devel-0:0.112-12.el7_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-12.el7_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-12.el7_4.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-12.el7_4.2.i686",
                  "product_id": "polkit-debuginfo-0:0.112-12.el7_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-12.el7_4.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.112-12.el7_4.2.noarch",
                "product": {
                  "name": "polkit-docs-0:0.112-12.el7_4.2.noarch",
                  "product_id": "polkit-docs-0:0.112-12.el7_4.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.112-12.el7_4.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_4.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.i686"
        },
        "product_reference": "polkit-0:0.112-12.el7_4.2.i686",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_4.2.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.src"
        },
        "product_reference": "polkit-0:0.112-12.el7_4.2.src",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.x86_64"
        },
        "product_reference": "polkit-0:0.112-12.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-12.el7_4.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-12.el7_4.2.i686",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-12.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-12.el7_4.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.i686"
        },
        "product_reference": "polkit-devel-0:0.112-12.el7_4.2.i686",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-12.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-12.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-12.el7_4.2.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
          "product_id": "7Server-7.4.AUS:polkit-docs-0:0.112-12.el7_4.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-12.el7_4.2.noarch",
        "relates_to_product_reference": "7Server-7.4.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.i686",
          "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.src",
          "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.x86_64",
          "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.i686",
          "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
          "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.i686",
          "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.x86_64",
          "7Server-7.4.AUS:polkit-docs-0:0.112-12.el7_4.2.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:30:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.src",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-docs-0:0.112-12.el7_4.2.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0272"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.src",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-docs-0:0.112-12.el7_4.2.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.src",
            "7Server-7.4.AUS:polkit-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-debuginfo-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.i686",
            "7Server-7.4.AUS:polkit-devel-0:0.112-12.el7_4.2.x86_64",
            "7Server-7.4.AUS:polkit-docs-0:0.112-12.el7_4.2.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  RHSA-2022:0268
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0268",
        "url": "https://access.redhat.com/errata/RHSA-2022:0268"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0268.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:13+00:00",
      "generator": {
        "date": "2025-10-09T21:42:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0268",
      "initial_release_date": "2022-01-25T18:04:56+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:04:56+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:04:56+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
                  "product_id": "BaseOS-8.1.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-9.el8_1.2.src",
                "product": {
                  "name": "polkit-0:0.115-9.el8_1.2.src",
                  "product_id": "polkit-0:0.115-9.el8_1.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-9.el8_1.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-devel-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-libs-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-libs-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-devel-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-libs-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-libs-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-9.el8_1.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.115-9.el8_1.2.i686",
                  "product_id": "polkit-devel-0:0.115-9.el8_1.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-9.el8_1.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-9.el8_1.2.i686",
                "product": {
                  "name": "polkit-libs-0:0.115-9.el8_1.2.i686",
                  "product_id": "polkit-libs-0:0.115-9.el8_1.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-9.el8_1.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-9.el8_1.2.i686",
                "product": {
                  "name": "polkit-debugsource-0:0.115-9.el8_1.2.i686",
                  "product_id": "polkit-debugsource-0:0.115-9.el8_1.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-9.el8_1.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-9.el8_1.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-9.el8_1.2.i686",
                  "product_id": "polkit-debuginfo-0:0.115-9.el8_1.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-9.el8_1.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
                  "product_id": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-9.el8_1.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.115-9.el8_1.2.noarch",
                "product": {
                  "name": "polkit-docs-0:0.115-9.el8_1.2.noarch",
                  "product_id": "polkit-docs-0:0.115-9.el8_1.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.115-9.el8_1.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-9.el8_1.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.src"
        },
        "product_reference": "polkit-0:0.115-9.el8_1.2.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-9.el8_1.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.115-9.el8_1.2.i686",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-9.el8_1.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.i686"
        },
        "product_reference": "polkit-debugsource-0:0.115-9.el8_1.2.i686",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-9.el8_1.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.i686"
        },
        "product_reference": "polkit-devel-0:0.115-9.el8_1.2.i686",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.115-9.el8_1.2.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-docs-0:0.115-9.el8_1.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.115-9.el8_1.2.noarch",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-9.el8_1.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.i686"
        },
        "product_reference": "polkit-libs-0:0.115-9.el8_1.2.i686",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-libs-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-libs-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.src",
          "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.x86_64",
          "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.i686",
          "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
          "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.i686",
          "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
          "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.i686",
          "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.x86_64",
          "BaseOS-8.1.0.Z.E4S:polkit-docs-0:0.115-9.el8_1.2.noarch",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.i686",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.x86_64",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:04:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.src",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-docs-0:0.115-9.el8_1.2.noarch",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0268"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.src",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-docs-0:0.115-9.el8_1.2.noarch",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.src",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-docs-0:0.115-9.el8_1.2.noarch",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022:0271
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0271",
        "url": "https://access.redhat.com/errata/RHSA-2022:0271"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0271.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:13+00:00",
      "generator": {
        "date": "2025-10-09T21:42:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0271",
      "initial_release_date": "2022-01-25T18:44:19+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:44:19+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:44:19+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                  "product_id": "7Server-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                  "product_id": "7Server-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                  "product_id": "7Server-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-18.el7_6.3.src",
                "product": {
                  "name": "polkit-0:0.112-18.el7_6.3.src",
                  "product_id": "polkit-0:0.112-18.el7_6.3.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-18.el7_6.3?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-18.el7_6.3.x86_64",
                "product": {
                  "name": "polkit-0:0.112-18.el7_6.3.x86_64",
                  "product_id": "polkit-0:0.112-18.el7_6.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-18.el7_6.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
                  "product_id": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-18.el7_6.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
                  "product_id": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-18.el7_6.3?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-18.el7_6.3.i686",
                "product": {
                  "name": "polkit-0:0.112-18.el7_6.3.i686",
                  "product_id": "polkit-0:0.112-18.el7_6.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-18.el7_6.3?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-18.el7_6.3.i686",
                "product": {
                  "name": "polkit-devel-0:0.112-18.el7_6.3.i686",
                  "product_id": "polkit-devel-0:0.112-18.el7_6.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-18.el7_6.3?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
                  "product_id": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-18.el7_6.3?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.112-18.el7_6.3.noarch",
                "product": {
                  "name": "polkit-docs-0:0.112-18.el7_6.3.noarch",
                  "product_id": "polkit-docs-0:0.112-18.el7_6.3.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.112-18.el7_6.3?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-18.el7_6.3.ppc64le",
                "product": {
                  "name": "polkit-0:0.112-18.el7_6.3.ppc64le",
                  "product_id": "polkit-0:0.112-18.el7_6.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-18.el7_6.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-18.el7_6.3.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.112-18.el7_6.3.ppc64le",
                  "product_id": "polkit-devel-0:0.112-18.el7_6.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-18.el7_6.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-18.el7_6.3?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.src"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.src",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-18.el7_6.3.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-18.el7_6.3.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.ppc64le"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.src"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-18.el7_6.3.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-docs-0:0.112-18.el7_6.3.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-18.el7_6.3.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.src"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.src",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-18.el7_6.3.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-18.el7_6.3.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.src",
          "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.AUS:polkit-docs-0:0.112-18.el7_6.3.noarch",
          "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.ppc64le",
          "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.src",
          "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
          "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.ppc64le",
          "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.E4S:polkit-docs-0:0.112-18.el7_6.3.noarch",
          "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.src",
          "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.TUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:44:19+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0271"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022_0268
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0268",
        "url": "https://access.redhat.com/errata/RHSA-2022:0268"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0268.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2024-11-15T10:45:15+00:00",
      "generator": {
        "date": "2024-11-15T10:45:15+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2022:0268",
      "initial_release_date": "2022-01-25T18:04:56+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:04:56+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:04:56+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:45:15+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
                  "product_id": "BaseOS-8.1.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-9.el8_1.2.src",
                "product": {
                  "name": "polkit-0:0.115-9.el8_1.2.src",
                  "product_id": "polkit-0:0.115-9.el8_1.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-9.el8_1.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-devel-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-libs-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-libs-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-devel-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-libs-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-libs-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-9.el8_1.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.115-9.el8_1.2.i686",
                  "product_id": "polkit-devel-0:0.115-9.el8_1.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-9.el8_1.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-9.el8_1.2.i686",
                "product": {
                  "name": "polkit-libs-0:0.115-9.el8_1.2.i686",
                  "product_id": "polkit-libs-0:0.115-9.el8_1.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-9.el8_1.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-9.el8_1.2.i686",
                "product": {
                  "name": "polkit-debugsource-0:0.115-9.el8_1.2.i686",
                  "product_id": "polkit-debugsource-0:0.115-9.el8_1.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-9.el8_1.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-9.el8_1.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-9.el8_1.2.i686",
                  "product_id": "polkit-debuginfo-0:0.115-9.el8_1.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-9.el8_1.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
                  "product_id": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-9.el8_1.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.115-9.el8_1.2.noarch",
                "product": {
                  "name": "polkit-docs-0:0.115-9.el8_1.2.noarch",
                  "product_id": "polkit-docs-0:0.115-9.el8_1.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.115-9.el8_1.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-9.el8_1.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.src"
        },
        "product_reference": "polkit-0:0.115-9.el8_1.2.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-9.el8_1.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.115-9.el8_1.2.i686",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-9.el8_1.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.i686"
        },
        "product_reference": "polkit-debugsource-0:0.115-9.el8_1.2.i686",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-9.el8_1.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.i686"
        },
        "product_reference": "polkit-devel-0:0.115-9.el8_1.2.i686",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.115-9.el8_1.2.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-docs-0:0.115-9.el8_1.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.115-9.el8_1.2.noarch",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-9.el8_1.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.i686"
        },
        "product_reference": "polkit-libs-0:0.115-9.el8_1.2.i686",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-libs-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-libs-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.src",
          "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.x86_64",
          "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.i686",
          "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
          "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.i686",
          "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
          "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.i686",
          "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.x86_64",
          "BaseOS-8.1.0.Z.E4S:polkit-docs-0:0.115-9.el8_1.2.noarch",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.i686",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.x86_64",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:04:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.src",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-docs-0:0.115-9.el8_1.2.noarch",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0268"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.src",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-docs-0:0.115-9.el8_1.2.noarch",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.src",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-docs-0:0.115-9.el8_1.2.noarch",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  RHSA-2022:0266
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0266",
        "url": "https://access.redhat.com/errata/RHSA-2022:0266"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0266.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:13+00:00",
      "generator": {
        "date": "2025-10-09T21:42:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0266",
      "initial_release_date": "2022-01-25T18:15:24+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:15:24+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:15:24+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
                  "product_id": "BaseOS-8.4.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.4::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_4.2.src",
                "product": {
                  "name": "polkit-0:0.115-11.el8_4.2.src",
                  "product_id": "polkit-0:0.115-11.el8_4.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_4.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-devel-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-libs-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-devel-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-libs-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-devel-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-libs-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_4.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_4.2.i686",
                  "product_id": "polkit-devel-0:0.115-11.el8_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_4.2.i686",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_4.2.i686",
                  "product_id": "polkit-libs-0:0.115-11.el8_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_4.2.i686",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_4.2.i686",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_4.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_4.2.i686",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_4.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-devel-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-libs-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.115-11.el8_4.2.noarch",
                "product": {
                  "name": "polkit-docs-0:0.115-11.el8_4.2.noarch",
                  "product_id": "polkit-docs-0:0.115-11.el8_4.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.115-11.el8_4.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_4.2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.src"
        },
        "product_reference": "polkit-0:0.115-11.el8_4.2.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_4.2.i686",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.i686"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_4.2.i686",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.i686"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_4.2.i686",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.115-11.el8_4.2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-docs-0:0.115-11.el8_4.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.115-11.el8_4.2.noarch",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.i686"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_4.2.i686",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.src",
          "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.x86_64",
          "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.i686",
          "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
          "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.i686",
          "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
          "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.i686",
          "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.x86_64",
          "BaseOS-8.4.0.Z.EUS:polkit-docs-0:0.115-11.el8_4.2.noarch",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.i686",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.x86_64",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:15:24+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.src",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-docs-0:0.115-11.el8_4.2.noarch",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0266"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.src",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-docs-0:0.115-11.el8_4.2.noarch",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.src",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-docs-0:0.115-11.el8_4.2.noarch",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022:0266
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0266",
        "url": "https://access.redhat.com/errata/RHSA-2022:0266"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0266.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:13+00:00",
      "generator": {
        "date": "2025-10-09T21:42:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0266",
      "initial_release_date": "2022-01-25T18:15:24+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:15:24+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:15:24+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
                  "product_id": "BaseOS-8.4.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.4::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_4.2.src",
                "product": {
                  "name": "polkit-0:0.115-11.el8_4.2.src",
                  "product_id": "polkit-0:0.115-11.el8_4.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_4.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-devel-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-libs-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_4.2?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-devel-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-libs-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_4.2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-devel-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-libs-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_4.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_4.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_4.2.i686",
                  "product_id": "polkit-devel-0:0.115-11.el8_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_4.2.i686",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_4.2.i686",
                  "product_id": "polkit-libs-0:0.115-11.el8_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_4.2.i686",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_4.2.i686",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_4.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_4.2.i686",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_4.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_4.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-devel-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-libs-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_4.2?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.115-11.el8_4.2.noarch",
                "product": {
                  "name": "polkit-docs-0:0.115-11.el8_4.2.noarch",
                  "product_id": "polkit-docs-0:0.115-11.el8_4.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.115-11.el8_4.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_4.2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.src"
        },
        "product_reference": "polkit-0:0.115-11.el8_4.2.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_4.2.i686",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.i686"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_4.2.i686",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.i686"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_4.2.i686",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.115-11.el8_4.2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-docs-0:0.115-11.el8_4.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.115-11.el8_4.2.noarch",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.i686"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_4.2.i686",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.src",
          "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.x86_64",
          "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.i686",
          "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
          "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.i686",
          "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
          "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.i686",
          "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.x86_64",
          "BaseOS-8.4.0.Z.EUS:polkit-docs-0:0.115-11.el8_4.2.noarch",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.i686",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.x86_64",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
          "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:15:24+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.src",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-docs-0:0.115-11.el8_4.2.noarch",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0266"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.src",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-docs-0:0.115-11.el8_4.2.noarch",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.src",
            "BaseOS-8.4.0.Z.EUS:polkit-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-devel-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-docs-0:0.115-11.el8_4.2.noarch",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-0:0.115-11.el8_4.2.x86_64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.aarch64",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.i686",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.ppc64le",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.s390x",
            "BaseOS-8.4.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022_0267
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0267",
        "url": "https://access.redhat.com/errata/RHSA-2022:0267"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0267.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2024-11-15T10:45:00+00:00",
      "generator": {
        "date": "2024-11-15T10:45:00+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2022:0267",
      "initial_release_date": "2022-01-25T19:47:29+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T19:47:29+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T19:47:29+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:45:00+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.5.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-13.el8_5.1.src",
                "product": {
                  "name": "polkit-0:0.115-13.el8_5.1.src",
                  "product_id": "polkit-0:0.115-13.el8_5.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-13.el8_5.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-devel-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-devel-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-libs-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-libs-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-devel-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-libs-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-libs-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-devel-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-libs-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-libs-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-13.el8_5.1.i686",
                "product": {
                  "name": "polkit-devel-0:0.115-13.el8_5.1.i686",
                  "product_id": "polkit-devel-0:0.115-13.el8_5.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-13.el8_5.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-13.el8_5.1.i686",
                "product": {
                  "name": "polkit-libs-0:0.115-13.el8_5.1.i686",
                  "product_id": "polkit-libs-0:0.115-13.el8_5.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-13.el8_5.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-13.el8_5.1.i686",
                "product": {
                  "name": "polkit-debugsource-0:0.115-13.el8_5.1.i686",
                  "product_id": "polkit-debugsource-0:0.115-13.el8_5.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-13.el8_5.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-13.el8_5.1.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-13.el8_5.1.i686",
                  "product_id": "polkit-debuginfo-0:0.115-13.el8_5.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-13.el8_5.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
                  "product_id": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-13.el8_5.1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-devel-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-devel-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-libs-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-libs-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-debugsource-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-debugsource-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.115-13.el8_5.1.noarch",
                "product": {
                  "name": "polkit-docs-0:0.115-13.el8_5.1.noarch",
                  "product_id": "polkit-docs-0:0.115-13.el8_5.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.115-13.el8_5.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-13.el8_5.1.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.src"
        },
        "product_reference": "polkit-0:0.115-13.el8_5.1.src",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-13.el8_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.115-13.el8_5.1.i686",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-13.el8_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.i686"
        },
        "product_reference": "polkit-debugsource-0:0.115-13.el8_5.1.i686",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-debugsource-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-devel-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-13.el8_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.i686"
        },
        "product_reference": "polkit-devel-0:0.115-13.el8_5.1.i686",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.115-13.el8_5.1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-docs-0:0.115-13.el8_5.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.115-13.el8_5.1.noarch",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-libs-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-13.el8_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.i686"
        },
        "product_reference": "polkit-libs-0:0.115-13.el8_5.1.i686",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-libs-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-libs-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-libs-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.src",
          "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.x86_64",
          "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.i686",
          "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
          "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.i686",
          "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
          "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.i686",
          "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.x86_64",
          "BaseOS-8.5.0.Z.MAIN:polkit-docs-0:0.115-13.el8_5.1.noarch",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.i686",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.x86_64",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T19:47:29+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.src",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-docs-0:0.115-13.el8_5.1.noarch",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0267"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.src",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-docs-0:0.115-13.el8_5.1.noarch",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.src",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-docs-0:0.115-13.el8_5.1.noarch",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022_0265
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0265",
        "url": "https://access.redhat.com/errata/RHSA-2022:0265"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0265.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2024-11-15T10:45:08+00:00",
      "generator": {
        "date": "2024-11-15T10:45:08+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2022:0265",
      "initial_release_date": "2022-01-25T18:04:10+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:04:10+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:04:10+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:45:08+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
                  "product_id": "BaseOS-8.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_2.2.src",
                "product": {
                  "name": "polkit-0:0.115-11.el8_2.2.src",
                  "product_id": "polkit-0:0.115-11.el8_2.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_2.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-devel-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-libs-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_2.2?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-devel-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-libs-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_2.2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-devel-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-libs-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_2.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_2.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_2.2.i686",
                  "product_id": "polkit-devel-0:0.115-11.el8_2.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_2.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_2.2.i686",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_2.2.i686",
                  "product_id": "polkit-libs-0:0.115-11.el8_2.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_2.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_2.2.i686",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_2.2.i686",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_2.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_2.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_2.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_2.2.i686",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_2.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_2.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_2.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-devel-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-devel-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-libs-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-libs-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-debugsource-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-debugsource-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
                  "product_id": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-11.el8_2.2?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.115-11.el8_2.2.noarch",
                "product": {
                  "name": "polkit-docs-0:0.115-11.el8_2.2.noarch",
                  "product_id": "polkit-docs-0:0.115-11.el8_2.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.115-11.el8_2.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_2.2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.src"
        },
        "product_reference": "polkit-0:0.115-11.el8_2.2.src",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_2.2.i686",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.i686"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_2.2.i686",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.i686"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_2.2.i686",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.115-11.el8_2.2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-docs-0:0.115-11.el8_2.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.115-11.el8_2.2.noarch",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.i686"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_2.2.i686",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-libs-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
          "product_id": "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.src",
          "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.x86_64",
          "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.i686",
          "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
          "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.i686",
          "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
          "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.i686",
          "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.x86_64",
          "BaseOS-8.2.0.Z.EUS:polkit-docs-0:0.115-11.el8_2.2.noarch",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.i686",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.x86_64",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
          "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:04:10+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.src",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-docs-0:0.115-11.el8_2.2.noarch",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0265"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.src",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-docs-0:0.115-11.el8_2.2.noarch",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.src",
            "BaseOS-8.2.0.Z.EUS:polkit-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debuginfo-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-debugsource-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-devel-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-docs-0:0.115-11.el8_2.2.noarch",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-0:0.115-11.el8_2.2.x86_64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.aarch64",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.i686",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.ppc64le",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.s390x",
            "BaseOS-8.2.0.Z.EUS:polkit-libs-debuginfo-0:0.115-11.el8_2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022:0268
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0268",
        "url": "https://access.redhat.com/errata/RHSA-2022:0268"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0268.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:13+00:00",
      "generator": {
        "date": "2025-10-09T21:42:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0268",
      "initial_release_date": "2022-01-25T18:04:56+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:04:56+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:04:56+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
                  "product_id": "BaseOS-8.1.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-9.el8_1.2.src",
                "product": {
                  "name": "polkit-0:0.115-9.el8_1.2.src",
                  "product_id": "polkit-0:0.115-9.el8_1.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-9.el8_1.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-devel-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-libs-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-libs-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                  "product_id": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-9.el8_1.2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-devel-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-libs-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-libs-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-9.el8_1.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-9.el8_1.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.115-9.el8_1.2.i686",
                  "product_id": "polkit-devel-0:0.115-9.el8_1.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-9.el8_1.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-9.el8_1.2.i686",
                "product": {
                  "name": "polkit-libs-0:0.115-9.el8_1.2.i686",
                  "product_id": "polkit-libs-0:0.115-9.el8_1.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-9.el8_1.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-9.el8_1.2.i686",
                "product": {
                  "name": "polkit-debugsource-0:0.115-9.el8_1.2.i686",
                  "product_id": "polkit-debugsource-0:0.115-9.el8_1.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-9.el8_1.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-9.el8_1.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-9.el8_1.2.i686",
                  "product_id": "polkit-debuginfo-0:0.115-9.el8_1.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-9.el8_1.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
                  "product_id": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-9.el8_1.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.115-9.el8_1.2.noarch",
                "product": {
                  "name": "polkit-docs-0:0.115-9.el8_1.2.noarch",
                  "product_id": "polkit-docs-0:0.115-9.el8_1.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.115-9.el8_1.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-9.el8_1.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.src"
        },
        "product_reference": "polkit-0:0.115-9.el8_1.2.src",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-9.el8_1.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.115-9.el8_1.2.i686",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-9.el8_1.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.i686"
        },
        "product_reference": "polkit-debugsource-0:0.115-9.el8_1.2.i686",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-9.el8_1.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.i686"
        },
        "product_reference": "polkit-devel-0:0.115-9.el8_1.2.i686",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.115-9.el8_1.2.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-docs-0:0.115-9.el8_1.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.115-9.el8_1.2.noarch",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-9.el8_1.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.i686"
        },
        "product_reference": "polkit-libs-0:0.115-9.el8_1.2.i686",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-libs-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-libs-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
          "product_id": "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64",
        "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.src",
          "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.x86_64",
          "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.i686",
          "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
          "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.i686",
          "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
          "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.i686",
          "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.x86_64",
          "BaseOS-8.1.0.Z.E4S:polkit-docs-0:0.115-9.el8_1.2.noarch",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.i686",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.x86_64",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
          "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:04:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.src",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-docs-0:0.115-9.el8_1.2.noarch",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0268"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.src",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-docs-0:0.115-9.el8_1.2.noarch",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.src",
            "BaseOS-8.1.0.Z.E4S:polkit-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debuginfo-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-debugsource-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-devel-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-docs-0:0.115-9.el8_1.2.noarch",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-0:0.115-9.el8_1.2.x86_64",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.i686",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.ppc64le",
            "BaseOS-8.1.0.Z.E4S:polkit-libs-debuginfo-0:0.115-9.el8_1.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022:0267
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0267",
        "url": "https://access.redhat.com/errata/RHSA-2022:0267"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0267.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:13+00:00",
      "generator": {
        "date": "2025-10-09T21:42:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0267",
      "initial_release_date": "2022-01-25T19:47:29+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T19:47:29+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T19:47:29+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.5.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-13.el8_5.1.src",
                "product": {
                  "name": "polkit-0:0.115-13.el8_5.1.src",
                  "product_id": "polkit-0:0.115-13.el8_5.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-13.el8_5.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-devel-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-devel-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-libs-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-libs-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-devel-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-libs-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-libs-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-devel-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-libs-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-libs-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-13.el8_5.1.i686",
                "product": {
                  "name": "polkit-devel-0:0.115-13.el8_5.1.i686",
                  "product_id": "polkit-devel-0:0.115-13.el8_5.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-13.el8_5.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-13.el8_5.1.i686",
                "product": {
                  "name": "polkit-libs-0:0.115-13.el8_5.1.i686",
                  "product_id": "polkit-libs-0:0.115-13.el8_5.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-13.el8_5.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-13.el8_5.1.i686",
                "product": {
                  "name": "polkit-debugsource-0:0.115-13.el8_5.1.i686",
                  "product_id": "polkit-debugsource-0:0.115-13.el8_5.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-13.el8_5.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-13.el8_5.1.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-13.el8_5.1.i686",
                  "product_id": "polkit-debuginfo-0:0.115-13.el8_5.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-13.el8_5.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
                  "product_id": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-13.el8_5.1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-devel-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-devel-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-libs-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-libs-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-debugsource-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-debugsource-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.115-13.el8_5.1.noarch",
                "product": {
                  "name": "polkit-docs-0:0.115-13.el8_5.1.noarch",
                  "product_id": "polkit-docs-0:0.115-13.el8_5.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.115-13.el8_5.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-13.el8_5.1.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.src"
        },
        "product_reference": "polkit-0:0.115-13.el8_5.1.src",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-13.el8_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.115-13.el8_5.1.i686",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-13.el8_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.i686"
        },
        "product_reference": "polkit-debugsource-0:0.115-13.el8_5.1.i686",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-debugsource-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-devel-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-13.el8_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.i686"
        },
        "product_reference": "polkit-devel-0:0.115-13.el8_5.1.i686",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.115-13.el8_5.1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-docs-0:0.115-13.el8_5.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.115-13.el8_5.1.noarch",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-libs-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-13.el8_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.i686"
        },
        "product_reference": "polkit-libs-0:0.115-13.el8_5.1.i686",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-libs-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-libs-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-libs-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.src",
          "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.x86_64",
          "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.i686",
          "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
          "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.i686",
          "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
          "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.i686",
          "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.x86_64",
          "BaseOS-8.5.0.Z.MAIN:polkit-docs-0:0.115-13.el8_5.1.noarch",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.i686",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.x86_64",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T19:47:29+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.src",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-docs-0:0.115-13.el8_5.1.noarch",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0267"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.src",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-docs-0:0.115-13.el8_5.1.noarch",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.src",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-docs-0:0.115-13.el8_5.1.noarch",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022_0273
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0273",
        "url": "https://access.redhat.com/errata/RHSA-2022:0273"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0273.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2024-11-15T10:44:24+00:00",
      "generator": {
        "date": "2024-11-15T10:44:24+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2022:0273",
      "initial_release_date": "2022-01-25T19:07:00+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T19:07:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T19:07:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:44:24+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                  "product_id": "7Server-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                  "product_id": "7Server-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                  "product_id": "7Server-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-22.el7_7.2.src",
                "product": {
                  "name": "polkit-0:0.112-22.el7_7.2.src",
                  "product_id": "polkit-0:0.112-22.el7_7.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-22.el7_7.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-22.el7_7.2.x86_64",
                "product": {
                  "name": "polkit-0:0.112-22.el7_7.2.x86_64",
                  "product_id": "polkit-0:0.112-22.el7_7.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-22.el7_7.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
                  "product_id": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-22.el7_7.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-22.el7_7.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-22.el7_7.2.i686",
                "product": {
                  "name": "polkit-0:0.112-22.el7_7.2.i686",
                  "product_id": "polkit-0:0.112-22.el7_7.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-22.el7_7.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-22.el7_7.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.112-22.el7_7.2.i686",
                  "product_id": "polkit-devel-0:0.112-22.el7_7.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-22.el7_7.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
                  "product_id": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-22.el7_7.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.112-22.el7_7.2.noarch",
                "product": {
                  "name": "polkit-docs-0:0.112-22.el7_7.2.noarch",
                  "product_id": "polkit-docs-0:0.112-22.el7_7.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.112-22.el7_7.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-22.el7_7.2.ppc64le",
                "product": {
                  "name": "polkit-0:0.112-22.el7_7.2.ppc64le",
                  "product_id": "polkit-0:0.112-22.el7_7.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-22.el7_7.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-22.el7_7.2.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.112-22.el7_7.2.ppc64le",
                  "product_id": "polkit-devel-0:0.112-22.el7_7.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-22.el7_7.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-22.el7_7.2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.src"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.src",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-22.el7_7.2.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-22.el7_7.2.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.ppc64le"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.src"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-22.el7_7.2.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-docs-0:0.112-22.el7_7.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-22.el7_7.2.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.src"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.src",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-22.el7_7.2.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-22.el7_7.2.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.src",
          "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.AUS:polkit-docs-0:0.112-22.el7_7.2.noarch",
          "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.ppc64le",
          "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.src",
          "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
          "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.ppc64le",
          "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.E4S:polkit-docs-0:0.112-22.el7_7.2.noarch",
          "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.src",
          "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.TUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T19:07:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0273"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  RHSA-2022:0267
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0267",
        "url": "https://access.redhat.com/errata/RHSA-2022:0267"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0267.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:13+00:00",
      "generator": {
        "date": "2025-10-09T21:42:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0267",
      "initial_release_date": "2022-01-25T19:47:29+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T19:47:29+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T19:47:29+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.5.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-13.el8_5.1.src",
                "product": {
                  "name": "polkit-0:0.115-13.el8_5.1.src",
                  "product_id": "polkit-0:0.115-13.el8_5.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-13.el8_5.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-devel-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-devel-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-libs-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-libs-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-13.el8_5.1?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-devel-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-libs-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-libs-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                  "product_id": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-13.el8_5.1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-devel-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-libs-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-libs-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64",
                  "product_id": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-13.el8_5.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-13.el8_5.1.i686",
                "product": {
                  "name": "polkit-devel-0:0.115-13.el8_5.1.i686",
                  "product_id": "polkit-devel-0:0.115-13.el8_5.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-13.el8_5.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-13.el8_5.1.i686",
                "product": {
                  "name": "polkit-libs-0:0.115-13.el8_5.1.i686",
                  "product_id": "polkit-libs-0:0.115-13.el8_5.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-13.el8_5.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-13.el8_5.1.i686",
                "product": {
                  "name": "polkit-debugsource-0:0.115-13.el8_5.1.i686",
                  "product_id": "polkit-debugsource-0:0.115-13.el8_5.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-13.el8_5.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-13.el8_5.1.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-13.el8_5.1.i686",
                  "product_id": "polkit-debuginfo-0:0.115-13.el8_5.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-13.el8_5.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
                  "product_id": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-13.el8_5.1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-devel-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-devel-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-libs-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-libs-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debugsource-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-debugsource-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-debugsource-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debugsource@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
                "product": {
                  "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
                  "product_id": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-libs-debuginfo@0.115-13.el8_5.1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.115-13.el8_5.1.noarch",
                "product": {
                  "name": "polkit-docs-0:0.115-13.el8_5.1.noarch",
                  "product_id": "polkit-docs-0:0.115-13.el8_5.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.115-13.el8_5.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-13.el8_5.1.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.src"
        },
        "product_reference": "polkit-0:0.115-13.el8_5.1.src",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-13.el8_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.115-13.el8_5.1.i686",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-13.el8_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.i686"
        },
        "product_reference": "polkit-debugsource-0:0.115-13.el8_5.1.i686",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-debugsource-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debugsource-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-devel-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-13.el8_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.i686"
        },
        "product_reference": "polkit-devel-0:0.115-13.el8_5.1.i686",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.115-13.el8_5.1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-docs-0:0.115-13.el8_5.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.115-13.el8_5.1.noarch",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-libs-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-13.el8_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.i686"
        },
        "product_reference": "polkit-libs-0:0.115-13.el8_5.1.i686",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-libs-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-libs-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-libs-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64"
        },
        "product_reference": "polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64",
        "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.src",
          "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.x86_64",
          "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.i686",
          "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
          "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.i686",
          "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
          "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.i686",
          "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.x86_64",
          "BaseOS-8.5.0.Z.MAIN:polkit-docs-0:0.115-13.el8_5.1.noarch",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.i686",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.x86_64",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
          "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T19:47:29+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.src",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-docs-0:0.115-13.el8_5.1.noarch",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0267"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.src",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-docs-0:0.115-13.el8_5.1.noarch",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.src",
            "BaseOS-8.5.0.Z.MAIN:polkit-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debuginfo-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-debugsource-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-devel-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-docs-0:0.115-13.el8_5.1.noarch",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-0:0.115-13.el8_5.1.x86_64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.aarch64",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.i686",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.ppc64le",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.s390x",
            "BaseOS-8.5.0.Z.MAIN:polkit-libs-debuginfo-0:0.115-13.el8_5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  RHSA-2022:0270
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0270",
        "url": "https://access.redhat.com/errata/RHSA-2022:0270"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0270.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:13+00:00",
      "generator": {
        "date": "2025-10-09T21:42:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0270",
      "initial_release_date": "2022-01-25T18:21:13+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:21:13+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:21:13+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                  "product_id": "7Server-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_3.1.src",
                "product": {
                  "name": "polkit-0:0.112-12.el7_3.1.src",
                  "product_id": "polkit-0:0.112-12.el7_3.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_3.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_3.1.x86_64",
                "product": {
                  "name": "polkit-0:0.112-12.el7_3.1.x86_64",
                  "product_id": "polkit-0:0.112-12.el7_3.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_3.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-12.el7_3.1.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.112-12.el7_3.1.x86_64",
                  "product_id": "polkit-devel-0:0.112-12.el7_3.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-12.el7_3.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
                  "product_id": "polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-12.el7_3.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_3.1.i686",
                "product": {
                  "name": "polkit-0:0.112-12.el7_3.1.i686",
                  "product_id": "polkit-0:0.112-12.el7_3.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_3.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-12.el7_3.1.i686",
                "product": {
                  "name": "polkit-devel-0:0.112-12.el7_3.1.i686",
                  "product_id": "polkit-devel-0:0.112-12.el7_3.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-12.el7_3.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-12.el7_3.1.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-12.el7_3.1.i686",
                  "product_id": "polkit-debuginfo-0:0.112-12.el7_3.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-12.el7_3.1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.112-12.el7_3.1.noarch",
                "product": {
                  "name": "polkit-docs-0:0.112-12.el7_3.1.noarch",
                  "product_id": "polkit-docs-0:0.112-12.el7_3.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.112-12.el7_3.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.i686"
        },
        "product_reference": "polkit-0:0.112-12.el7_3.1.i686",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_3.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.src"
        },
        "product_reference": "polkit-0:0.112-12.el7_3.1.src",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-12.el7_3.1.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-12.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-12.el7_3.1.i686",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-12.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-12.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-12.el7_3.1.i686",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-12.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-12.el7_3.1.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-12.el7_3.1.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-docs-0:0.112-12.el7_3.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-12.el7_3.1.noarch",
        "relates_to_product_reference": "7Server-7.3.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.i686",
          "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.src",
          "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.x86_64",
          "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.i686",
          "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
          "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.i686",
          "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.x86_64",
          "7Server-7.3.AUS:polkit-docs-0:0.112-12.el7_3.1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:21:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.src",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-docs-0:0.112-12.el7_3.1.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0270"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.src",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-docs-0:0.112-12.el7_3.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.src",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-docs-0:0.112-12.el7_3.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022:0274
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0274",
        "url": "https://access.redhat.com/errata/RHSA-2022:0274"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0274.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:14+00:00",
      "generator": {
        "date": "2025-10-09T21:42:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0274",
      "initial_release_date": "2022-01-25T20:10:56+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T20:10:56+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T20:10:56+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.src",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.src",
                  "product_id": "polkit-0:0.112-26.el7_9.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.x86_64",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.x86_64",
                  "product_id": "polkit-0:0.112-26.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.i686",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.i686",
                  "product_id": "polkit-0:0.112-26.el7_9.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.i686",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.i686",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.112-26.el7_9.1.noarch",
                "product": {
                  "name": "polkit-docs-0:0.112-26.el7_9.1.noarch",
                  "product_id": "polkit-docs-0:0.112-26.el7_9.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.112-26.el7_9.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.ppc",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.ppc",
                  "product_id": "polkit-0:0.112-26.el7_9.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.ppc",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.ppc",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.ppc64",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.ppc64",
                  "product_id": "polkit-0:0.112-26.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.ppc64le",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.ppc64le",
                  "product_id": "polkit-0:0.112-26.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.s390",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.s390",
                  "product_id": "polkit-0:0.112-26.el7_9.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.s390",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.s390",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.s390x",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.s390x",
                  "product_id": "polkit-0:0.112-26.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.s390x",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.s390x",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.src"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.src",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-26.el7_9.1.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-26.el7_9.1.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-26.el7_9.1.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-26.el7_9.1.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-26.el7_9.1.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-26.el7_9.1.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.src"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-26.el7_9.1.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-26.el7_9.1.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.src"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-26.el7_9.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-26.el7_9.1.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
          "7Client-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
          "7Server-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
          "7Workstation-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T20:10:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0274"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022_0269
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0269",
        "url": "https://access.redhat.com/errata/RHSA-2022:0269"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0269.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2024-11-15T10:45:00+00:00",
      "generator": {
        "date": "2024-11-15T10:45:00+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2022:0269",
      "initial_release_date": "2022-01-25T18:21:43+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:21:43+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:21:43+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:45:00+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
                  "product_id": "6Server-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.96-11.el6_10.2.src",
                "product": {
                  "name": "polkit-0:0.96-11.el6_10.2.src",
                  "product_id": "polkit-0:0.96-11.el6_10.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.96-11.el6_10.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.96-11.el6_10.2.s390",
                "product": {
                  "name": "polkit-0:0.96-11.el6_10.2.s390",
                  "product_id": "polkit-0:0.96-11.el6_10.2.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.96-11.el6_10.2?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.96-11.el6_10.2.s390",
                "product": {
                  "name": "polkit-devel-0:0.96-11.el6_10.2.s390",
                  "product_id": "polkit-devel-0:0.96-11.el6_10.2.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.96-11.el6_10.2?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390",
                "product": {
                  "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390",
                  "product_id": "polkit-debuginfo-0:0.96-11.el6_10.2.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.96-11.el6_10.2?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.96-11.el6_10.2.s390x",
                "product": {
                  "name": "polkit-0:0.96-11.el6_10.2.s390x",
                  "product_id": "polkit-0:0.96-11.el6_10.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.96-11.el6_10.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.96-11.el6_10.2.s390x",
                "product": {
                  "name": "polkit-devel-0:0.96-11.el6_10.2.s390x",
                  "product_id": "polkit-devel-0:0.96-11.el6_10.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.96-11.el6_10.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.96-11.el6_10.2.s390x",
                "product": {
                  "name": "polkit-docs-0:0.96-11.el6_10.2.s390x",
                  "product_id": "polkit-docs-0:0.96-11.el6_10.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.96-11.el6_10.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
                "product": {
                  "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
                  "product_id": "polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.96-11.el6_10.2?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.96-11.el6_10.2.x86_64",
                "product": {
                  "name": "polkit-0:0.96-11.el6_10.2.x86_64",
                  "product_id": "polkit-0:0.96-11.el6_10.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.96-11.el6_10.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.96-11.el6_10.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.96-11.el6_10.2.x86_64",
                  "product_id": "polkit-devel-0:0.96-11.el6_10.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.96-11.el6_10.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.96-11.el6_10.2.x86_64",
                "product": {
                  "name": "polkit-docs-0:0.96-11.el6_10.2.x86_64",
                  "product_id": "polkit-docs-0:0.96-11.el6_10.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.96-11.el6_10.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.96-11.el6_10.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.96-11.el6_10.2.i686",
                "product": {
                  "name": "polkit-0:0.96-11.el6_10.2.i686",
                  "product_id": "polkit-0:0.96-11.el6_10.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.96-11.el6_10.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.96-11.el6_10.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.96-11.el6_10.2.i686",
                  "product_id": "polkit-devel-0:0.96-11.el6_10.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.96-11.el6_10.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.96-11.el6_10.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.96-11.el6_10.2.i686",
                  "product_id": "polkit-debuginfo-0:0.96-11.el6_10.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.96-11.el6_10.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.96-11.el6_10.2.i686",
                "product": {
                  "name": "polkit-docs-0:0.96-11.el6_10.2.i686",
                  "product_id": "polkit-docs-0:0.96-11.el6_10.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.96-11.el6_10.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
                "product": {
                  "name": "polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
                  "product_id": "polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-desktop-policy@0.96-11.el6_10.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.96-11.el6_10.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-0:0.96-11.el6_10.2.i686"
        },
        "product_reference": "polkit-0:0.96-11.el6_10.2.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.96-11.el6_10.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390"
        },
        "product_reference": "polkit-0:0.96-11.el6_10.2.s390",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.96-11.el6_10.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390x"
        },
        "product_reference": "polkit-0:0.96-11.el6_10.2.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.96-11.el6_10.2.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-0:0.96-11.el6_10.2.src"
        },
        "product_reference": "polkit-0:0.96-11.el6_10.2.src",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.96-11.el6_10.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-0:0.96-11.el6_10.2.x86_64"
        },
        "product_reference": "polkit-0:0.96-11.el6_10.2.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.96-11.el6_10.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.96-11.el6_10.2.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.96-11.el6_10.2.s390",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.96-11.el6_10.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.96-11.el6_10.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-desktop-policy-0:0.96-11.el6_10.2.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-desktop-policy-0:0.96-11.el6_10.2.noarch"
        },
        "product_reference": "polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.96-11.el6_10.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.i686"
        },
        "product_reference": "polkit-devel-0:0.96-11.el6_10.2.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.96-11.el6_10.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390"
        },
        "product_reference": "polkit-devel-0:0.96-11.el6_10.2.s390",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.96-11.el6_10.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390x"
        },
        "product_reference": "polkit-devel-0:0.96-11.el6_10.2.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.96-11.el6_10.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.96-11.el6_10.2.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.96-11.el6_10.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.i686"
        },
        "product_reference": "polkit-docs-0:0.96-11.el6_10.2.i686",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.96-11.el6_10.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.s390x"
        },
        "product_reference": "polkit-docs-0:0.96-11.el6_10.2.s390x",
        "relates_to_product_reference": "6Server-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.96-11.el6_10.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
          "product_id": "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.x86_64"
        },
        "product_reference": "polkit-docs-0:0.96-11.el6_10.2.x86_64",
        "relates_to_product_reference": "6Server-ELS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS:polkit-0:0.96-11.el6_10.2.i686",
          "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390",
          "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390x",
          "6Server-ELS:polkit-0:0.96-11.el6_10.2.src",
          "6Server-ELS:polkit-0:0.96-11.el6_10.2.x86_64",
          "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.i686",
          "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390",
          "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
          "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
          "6Server-ELS:polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
          "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.i686",
          "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390",
          "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390x",
          "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.x86_64",
          "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.i686",
          "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.s390x",
          "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:21:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.src",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0269"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.src",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.src",
            "6Server-ELS:polkit-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-debuginfo-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-desktop-policy-0:0.96-11.el6_10.2.noarch",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-devel-0:0.96-11.el6_10.2.x86_64",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.i686",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.s390x",
            "6Server-ELS:polkit-docs-0:0.96-11.el6_10.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  RHSA-2022:0274
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0274",
        "url": "https://access.redhat.com/errata/RHSA-2022:0274"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0274.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:14+00:00",
      "generator": {
        "date": "2025-10-09T21:42:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0274",
      "initial_release_date": "2022-01-25T20:10:56+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T20:10:56+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T20:10:56+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.src",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.src",
                  "product_id": "polkit-0:0.112-26.el7_9.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.x86_64",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.x86_64",
                  "product_id": "polkit-0:0.112-26.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.i686",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.i686",
                  "product_id": "polkit-0:0.112-26.el7_9.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.i686",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.i686",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.112-26.el7_9.1.noarch",
                "product": {
                  "name": "polkit-docs-0:0.112-26.el7_9.1.noarch",
                  "product_id": "polkit-docs-0:0.112-26.el7_9.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.112-26.el7_9.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.ppc",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.ppc",
                  "product_id": "polkit-0:0.112-26.el7_9.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.ppc",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.ppc",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.ppc64",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.ppc64",
                  "product_id": "polkit-0:0.112-26.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.ppc64le",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.ppc64le",
                  "product_id": "polkit-0:0.112-26.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.s390",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.s390",
                  "product_id": "polkit-0:0.112-26.el7_9.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.s390",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.s390",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.s390x",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.s390x",
                  "product_id": "polkit-0:0.112-26.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.s390x",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.s390x",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.src"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.src",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-26.el7_9.1.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-26.el7_9.1.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-26.el7_9.1.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-26.el7_9.1.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-26.el7_9.1.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-26.el7_9.1.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.src"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-26.el7_9.1.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-26.el7_9.1.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.src"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-26.el7_9.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-26.el7_9.1.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
          "7Client-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
          "7Server-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
          "7Workstation-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T20:10:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0274"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022:0270
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0270",
        "url": "https://access.redhat.com/errata/RHSA-2022:0270"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0270.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:13+00:00",
      "generator": {
        "date": "2025-10-09T21:42:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0270",
      "initial_release_date": "2022-01-25T18:21:13+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:21:13+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:21:13+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
                  "product_id": "7Server-7.3.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_3.1.src",
                "product": {
                  "name": "polkit-0:0.112-12.el7_3.1.src",
                  "product_id": "polkit-0:0.112-12.el7_3.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_3.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_3.1.x86_64",
                "product": {
                  "name": "polkit-0:0.112-12.el7_3.1.x86_64",
                  "product_id": "polkit-0:0.112-12.el7_3.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_3.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-12.el7_3.1.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.112-12.el7_3.1.x86_64",
                  "product_id": "polkit-devel-0:0.112-12.el7_3.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-12.el7_3.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
                  "product_id": "polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-12.el7_3.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-12.el7_3.1.i686",
                "product": {
                  "name": "polkit-0:0.112-12.el7_3.1.i686",
                  "product_id": "polkit-0:0.112-12.el7_3.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-12.el7_3.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-12.el7_3.1.i686",
                "product": {
                  "name": "polkit-devel-0:0.112-12.el7_3.1.i686",
                  "product_id": "polkit-devel-0:0.112-12.el7_3.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-12.el7_3.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-12.el7_3.1.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-12.el7_3.1.i686",
                  "product_id": "polkit-debuginfo-0:0.112-12.el7_3.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-12.el7_3.1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.112-12.el7_3.1.noarch",
                "product": {
                  "name": "polkit-docs-0:0.112-12.el7_3.1.noarch",
                  "product_id": "polkit-docs-0:0.112-12.el7_3.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.112-12.el7_3.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.i686"
        },
        "product_reference": "polkit-0:0.112-12.el7_3.1.i686",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_3.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.src"
        },
        "product_reference": "polkit-0:0.112-12.el7_3.1.src",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-12.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-12.el7_3.1.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-12.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-12.el7_3.1.i686",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-12.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-12.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-12.el7_3.1.i686",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-12.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-12.el7_3.1.x86_64",
        "relates_to_product_reference": "7Server-7.3.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-12.el7_3.1.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
          "product_id": "7Server-7.3.AUS:polkit-docs-0:0.112-12.el7_3.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-12.el7_3.1.noarch",
        "relates_to_product_reference": "7Server-7.3.AUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.i686",
          "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.src",
          "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.x86_64",
          "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.i686",
          "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
          "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.i686",
          "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.x86_64",
          "7Server-7.3.AUS:polkit-docs-0:0.112-12.el7_3.1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:21:13+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.src",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-docs-0:0.112-12.el7_3.1.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0270"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.src",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-docs-0:0.112-12.el7_3.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.src",
            "7Server-7.3.AUS:polkit-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-debuginfo-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.i686",
            "7Server-7.3.AUS:polkit-devel-0:0.112-12.el7_3.1.x86_64",
            "7Server-7.3.AUS:polkit-docs-0:0.112-12.el7_3.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022_0271
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0271",
        "url": "https://access.redhat.com/errata/RHSA-2022:0271"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0271.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2024-11-15T10:44:45+00:00",
      "generator": {
        "date": "2024-11-15T10:44:45+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2022:0271",
      "initial_release_date": "2022-01-25T18:44:19+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:44:19+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:44:19+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:44:45+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                  "product_id": "7Server-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                  "product_id": "7Server-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                  "product_id": "7Server-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-18.el7_6.3.src",
                "product": {
                  "name": "polkit-0:0.112-18.el7_6.3.src",
                  "product_id": "polkit-0:0.112-18.el7_6.3.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-18.el7_6.3?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-18.el7_6.3.x86_64",
                "product": {
                  "name": "polkit-0:0.112-18.el7_6.3.x86_64",
                  "product_id": "polkit-0:0.112-18.el7_6.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-18.el7_6.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
                  "product_id": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-18.el7_6.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
                  "product_id": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-18.el7_6.3?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-18.el7_6.3.i686",
                "product": {
                  "name": "polkit-0:0.112-18.el7_6.3.i686",
                  "product_id": "polkit-0:0.112-18.el7_6.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-18.el7_6.3?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-18.el7_6.3.i686",
                "product": {
                  "name": "polkit-devel-0:0.112-18.el7_6.3.i686",
                  "product_id": "polkit-devel-0:0.112-18.el7_6.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-18.el7_6.3?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
                  "product_id": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-18.el7_6.3?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.112-18.el7_6.3.noarch",
                "product": {
                  "name": "polkit-docs-0:0.112-18.el7_6.3.noarch",
                  "product_id": "polkit-docs-0:0.112-18.el7_6.3.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.112-18.el7_6.3?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-18.el7_6.3.ppc64le",
                "product": {
                  "name": "polkit-0:0.112-18.el7_6.3.ppc64le",
                  "product_id": "polkit-0:0.112-18.el7_6.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-18.el7_6.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-18.el7_6.3.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.112-18.el7_6.3.ppc64le",
                  "product_id": "polkit-devel-0:0.112-18.el7_6.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-18.el7_6.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-18.el7_6.3?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.src"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.src",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-18.el7_6.3.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-18.el7_6.3.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.ppc64le"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.src"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-18.el7_6.3.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-docs-0:0.112-18.el7_6.3.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-18.el7_6.3.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.src"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.src",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-18.el7_6.3.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-18.el7_6.3.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.src",
          "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.AUS:polkit-docs-0:0.112-18.el7_6.3.noarch",
          "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.ppc64le",
          "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.src",
          "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
          "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.ppc64le",
          "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.E4S:polkit-docs-0:0.112-18.el7_6.3.noarch",
          "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.src",
          "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.TUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:44:19+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0271"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022_0274
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0274",
        "url": "https://access.redhat.com/errata/RHSA-2022:0274"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0274.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2024-11-15T10:44:31+00:00",
      "generator": {
        "date": "2024-11-15T10:44:31+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2022:0274",
      "initial_release_date": "2022-01-25T20:10:56+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T20:10:56+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T20:10:56+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:44:31+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.src",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.src",
                  "product_id": "polkit-0:0.112-26.el7_9.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.x86_64",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.x86_64",
                  "product_id": "polkit-0:0.112-26.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.i686",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.i686",
                  "product_id": "polkit-0:0.112-26.el7_9.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.i686",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.i686",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.112-26.el7_9.1.noarch",
                "product": {
                  "name": "polkit-docs-0:0.112-26.el7_9.1.noarch",
                  "product_id": "polkit-docs-0:0.112-26.el7_9.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.112-26.el7_9.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.ppc",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.ppc",
                  "product_id": "polkit-0:0.112-26.el7_9.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.ppc",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.ppc",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.ppc64",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.ppc64",
                  "product_id": "polkit-0:0.112-26.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.ppc64le",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.ppc64le",
                  "product_id": "polkit-0:0.112-26.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.s390",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.s390",
                  "product_id": "polkit-0:0.112-26.el7_9.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.s390",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.s390",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-26.el7_9.1.s390x",
                "product": {
                  "name": "polkit-0:0.112-26.el7_9.1.s390x",
                  "product_id": "polkit-0:0.112-26.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-26.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-26.el7_9.1.s390x",
                "product": {
                  "name": "polkit-devel-0:0.112-26.el7_9.1.s390x",
                  "product_id": "polkit-devel-0:0.112-26.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-26.el7_9.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
                  "product_id": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-26.el7_9.1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.src"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.src",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-26.el7_9.1.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-26.el7_9.1.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-26.el7_9.1.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-26.el7_9.1.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-26.el7_9.1.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-26.el7_9.1.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.src"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-26.el7_9.1.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-26.el7_9.1.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.src"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.i686",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-26.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-26.el7_9.1.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-26.el7_9.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-26.el7_9.1.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
          "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
          "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
          "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
          "7Client-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
          "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
          "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
          "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
          "7Client-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
          "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
          "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
          "7ComputeNode-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
          "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
          "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
          "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
          "7Server-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
          "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
          "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
          "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
          "7Workstation-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T20:10:56+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0274"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Client-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Client-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Client-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7ComputeNode-optional-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7ComputeNode-optional-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7ComputeNode-optional-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Server-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Server-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Server-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.src",
            "7Workstation-7.9.Z:polkit-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-debuginfo-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.i686",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.ppc64le",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.s390x",
            "7Workstation-7.9.Z:polkit-devel-0:0.112-26.el7_9.1.x86_64",
            "7Workstation-7.9.Z:polkit-docs-0:0.112-26.el7_9.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  RHSA-2022:0443
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\n* samba: Active Directory (AD) domain user could become root on domain members (CVE-2020-25717)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0443",
        "url": "https://access.redhat.com/errata/RHSA-2022:0443"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2019672",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019672"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0443.json"
      }
    ],
    "title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.21",
    "tracking": {
      "current_release_date": "2025-10-09T20:25:23+00:00",
      "generator": {
        "date": "2025-10-09T20:25:23+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0443",
      "initial_release_date": "2022-02-07T10:46:52+00:00",
      "revision_history": [
        {
          "date": "2022-02-07T10:46:52+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-02-07T10:46:52+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:25:23+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
                "product": {
                  "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
                  "product_id": "7Server-RHEV-4-HypervisorBuild-7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
                "product": {
                  "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
                  "product_id": "7Server-RHEV-4-Hypervisor-7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
                  "product_id": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.21-1.el7ev?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
                "product": {
                  "name": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
                  "product_id": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.21-20220126.0.el7_9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.21-1.el7ev?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch",
                  "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.21-1.el7ev?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
                  "product_id": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.21-20220126.0.el7_9?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
          "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
        "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
          "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "the Samba project"
          ]
        },
        {
          "names": [
            "Andrew Bartlett"
          ],
          "organization": "Catalyst and the Samba Team"
        }
      ],
      "cve": "CVE-2020-25717",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-03T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2019672"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "samba: Active Directory (AD) domain user could become root on domain members",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
        ],
        "known_not_affected": [
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-25717"
        },
        {
          "category": "external",
          "summary": "RHBZ#2019672",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019672"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25717",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-25717"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25717",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25717"
        },
        {
          "category": "external",
          "summary": "https://www.samba.org/samba/security/CVE-2020-25717.html",
          "url": "https://www.samba.org/samba/security/CVE-2020-25717.html"
        }
      ],
      "release_date": "2021-11-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-07T10:46:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0443"
        },
        {
          "category": "workaround",
          "details": "Setting \"gensec:require_pac=true\" in the smb.conf makes, due to a cache prime in winbind, the DOMAIN\\user lookup succeed, provided nss_winbind is in use, \u0027winbind use default domain = no\u0027 (the default) and no error paths are hit.  \n\nIt would be prudent to pre-create disabled users in Active Directory matching on all privileged names not held in Active Directory, eg \n~~~\n samba-tool user add root -H ldap://$SERVER -U$USERNAME%$PASSWORD --random-password\n samba-tool user add ubuntu -H ldap://$SERVER -U$USERNAME%$PASSWORD --random-password\n ~~~\n (repeat for eg all system users under 1000 in /etc/passwd or special to any other AD-connected services, eg perhaps \"admin\" for a web-app)",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "samba: Active Directory (AD) domain user could become root on domain members"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
        ],
        "known_not_affected": [
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-07T10:46:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0443"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  RHSA-2022:0271
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0271",
        "url": "https://access.redhat.com/errata/RHSA-2022:0271"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0271.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:13+00:00",
      "generator": {
        "date": "2025-10-09T21:42:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0271",
      "initial_release_date": "2022-01-25T18:44:19+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T18:44:19+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T18:44:19+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                  "product_id": "7Server-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                  "product_id": "7Server-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                  "product_id": "7Server-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-18.el7_6.3.src",
                "product": {
                  "name": "polkit-0:0.112-18.el7_6.3.src",
                  "product_id": "polkit-0:0.112-18.el7_6.3.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-18.el7_6.3?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-18.el7_6.3.x86_64",
                "product": {
                  "name": "polkit-0:0.112-18.el7_6.3.x86_64",
                  "product_id": "polkit-0:0.112-18.el7_6.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-18.el7_6.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
                  "product_id": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-18.el7_6.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
                  "product_id": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-18.el7_6.3?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-18.el7_6.3.i686",
                "product": {
                  "name": "polkit-0:0.112-18.el7_6.3.i686",
                  "product_id": "polkit-0:0.112-18.el7_6.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-18.el7_6.3?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-18.el7_6.3.i686",
                "product": {
                  "name": "polkit-devel-0:0.112-18.el7_6.3.i686",
                  "product_id": "polkit-devel-0:0.112-18.el7_6.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-18.el7_6.3?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
                  "product_id": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-18.el7_6.3?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.112-18.el7_6.3.noarch",
                "product": {
                  "name": "polkit-docs-0:0.112-18.el7_6.3.noarch",
                  "product_id": "polkit-docs-0:0.112-18.el7_6.3.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.112-18.el7_6.3?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-18.el7_6.3.ppc64le",
                "product": {
                  "name": "polkit-0:0.112-18.el7_6.3.ppc64le",
                  "product_id": "polkit-0:0.112-18.el7_6.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-18.el7_6.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-18.el7_6.3.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.112-18.el7_6.3.ppc64le",
                  "product_id": "polkit-devel-0:0.112-18.el7_6.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-18.el7_6.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-18.el7_6.3?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.src"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.src",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-18.el7_6.3.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-18.el7_6.3.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.ppc64le"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.src"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-18.el7_6.3.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:polkit-docs-0:0.112-18.el7_6.3.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-18.el7_6.3.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.src"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.src",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.i686"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.i686",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-18.el7_6.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-18.el7_6.3.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-18.el7_6.3.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-18.el7_6.3.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.src",
          "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.AUS:polkit-docs-0:0.112-18.el7_6.3.noarch",
          "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.ppc64le",
          "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.src",
          "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
          "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.ppc64le",
          "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.E4S:polkit-docs-0:0.112-18.el7_6.3.noarch",
          "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.src",
          "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.i686",
          "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
          "7Server-7.6.TUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T18:44:19+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0271"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.AUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.AUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.AUS:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.E4S:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.ppc64le",
            "7Server-7.6.E4S:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.E4S:polkit-docs-0:0.112-18.el7_6.3.noarch",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.src",
            "7Server-7.6.TUS:polkit-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-debuginfo-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.i686",
            "7Server-7.6.TUS:polkit-devel-0:0.112-18.el7_6.3.x86_64",
            "7Server-7.6.TUS:polkit-docs-0:0.112-18.el7_6.3.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  rhsa-2022:0443
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\n* samba: Active Directory (AD) domain user could become root on domain members (CVE-2020-25717)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0443",
        "url": "https://access.redhat.com/errata/RHSA-2022:0443"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2019672",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019672"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0443.json"
      }
    ],
    "title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.21",
    "tracking": {
      "current_release_date": "2025-10-09T20:25:23+00:00",
      "generator": {
        "date": "2025-10-09T20:25:23+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0443",
      "initial_release_date": "2022-02-07T10:46:52+00:00",
      "revision_history": [
        {
          "date": "2022-02-07T10:46:52+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-02-07T10:46:52+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:25:23+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
                "product": {
                  "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
                  "product_id": "7Server-RHEV-4-HypervisorBuild-7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
                "product": {
                  "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
                  "product_id": "7Server-RHEV-4-Hypervisor-7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
                  "product_id": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.21-1.el7ev?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
                "product": {
                  "name": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
                  "product_id": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.21-20220126.0.el7_9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.21-1.el7ev?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch",
                  "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.21-1.el7ev?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
                  "product_id": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.21-20220126.0.el7_9?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
          "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
        "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
          "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch",
        "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "the Samba project"
          ]
        },
        {
          "names": [
            "Andrew Bartlett"
          ],
          "organization": "Catalyst and the Samba Team"
        }
      ],
      "cve": "CVE-2020-25717",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-03T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2019672"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "samba: Active Directory (AD) domain user could become root on domain members",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
        ],
        "known_not_affected": [
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-25717"
        },
        {
          "category": "external",
          "summary": "RHBZ#2019672",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019672"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25717",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-25717"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25717",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25717"
        },
        {
          "category": "external",
          "summary": "https://www.samba.org/samba/security/CVE-2020-25717.html",
          "url": "https://www.samba.org/samba/security/CVE-2020-25717.html"
        }
      ],
      "release_date": "2021-11-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-07T10:46:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0443"
        },
        {
          "category": "workaround",
          "details": "Setting \"gensec:require_pac=true\" in the smb.conf makes, due to a cache prime in winbind, the DOMAIN\\user lookup succeed, provided nss_winbind is in use, \u0027winbind use default domain = no\u0027 (the default) and no error paths are hit.  \n\nIt would be prudent to pre-create disabled users in Active Directory matching on all privileged names not held in Active Directory, eg \n~~~\n samba-tool user add root -H ldap://$SERVER -U$USERNAME%$PASSWORD --random-password\n samba-tool user add ubuntu -H ldap://$SERVER -U$USERNAME%$PASSWORD --random-password\n ~~~\n (repeat for eg all system users under 1000 in /etc/passwd or special to any other AD-connected services, eg perhaps \"admin\" for a web-app)",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "samba: Active Directory (AD) domain user could become root on domain members"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
          "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
        ],
        "known_not_affected": [
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
          "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-07T10:46:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0443"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.21-1.el7ev.x86_64",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.21-20220126.0.el7_9.src",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.21-20220126.0.el7_9.noarch",
            "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.21-1.el7ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  RHSA-2022:0540
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\n* aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417)\n\n* kernel: fs_context: heap overflow in legacy parameter handling (CVE-2022-0185)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Rebased wget package and its dependencies for the same version shipped with recent RHEL. (BZ#2030082)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0540",
        "url": "https://access.redhat.com/errata/RHSA-2022:0540"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "external",
        "summary": "2030082",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030082"
      },
      {
        "category": "external",
        "summary": "2034685",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034685"
      },
      {
        "category": "external",
        "summary": "2034813",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
      },
      {
        "category": "external",
        "summary": "2040358",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040358"
      },
      {
        "category": "external",
        "summary": "2041489",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0540.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.4.10-1]",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:20+00:00",
      "generator": {
        "date": "2025-10-09T21:42:20+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0540",
      "initial_release_date": "2022-02-15T11:01:25+00:00",
      "revision_history": [
        {
          "date": "2022-02-15T11:01:25+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-02-15T11:01:25+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:20+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
                "product": {
                  "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
                  "product_id": "8Base-RHV-Hypervisor-4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
                "product": {
                  "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
                  "product_id": "8Base-RHV-HypervisorBuild-4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wget-0:1.19.5-10.el8.x86_64",
                "product": {
                  "name": "wget-0:1.19.5-10.el8.x86_64",
                  "product_id": "wget-0:1.19.5-10.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wget-debugsource-0:1.19.5-10.el8.x86_64",
                "product": {
                  "name": "wget-debugsource-0:1.19.5-10.el8.x86_64",
                  "product_id": "wget-debugsource-0:1.19.5-10.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-10.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wget-debuginfo-0:1.19.5-10.el8.x86_64",
                "product": {
                  "name": "wget-debuginfo-0:1.19.5-10.el8.x86_64",
                  "product_id": "wget-debuginfo-0:1.19.5-10.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-10.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libmetalink-0:0.1.3-7.el8.x86_64",
                "product": {
                  "name": "libmetalink-0:0.1.3-7.el8.x86_64",
                  "product_id": "libmetalink-0:0.1.3-7.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libmetalink@0.1.3-7.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libmetalink-devel-0:0.1.3-7.el8.x86_64",
                "product": {
                  "name": "libmetalink-devel-0:0.1.3-7.el8.x86_64",
                  "product_id": "libmetalink-devel-0:0.1.3-7.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libmetalink-devel@0.1.3-7.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
                "product": {
                  "name": "libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
                  "product_id": "libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libmetalink-debugsource@0.1.3-7.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
                "product": {
                  "name": "libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
                  "product_id": "libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libmetalink-debuginfo@0.1.3-7.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.10-1.el8ev?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.4.10-1.el8ev?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
                "product": {
                  "name": "redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
                  "product_id": "redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.10-202202081536_8.5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wget-0:1.19.5-10.el8.src",
                "product": {
                  "name": "wget-0:1.19.5-10.el8.src",
                  "product_id": "wget-0:1.19.5-10.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libmetalink-0:0.1.3-7.el8.src",
                "product": {
                  "name": "libmetalink-0:0.1.3-7.el8.src",
                  "product_id": "libmetalink-0:0.1.3-7.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libmetalink@0.1.3-7.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
                  "product_id": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.10-1.el8ev?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
                "product": {
                  "name": "redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
                  "product_id": "redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.10-202202081536_8.5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch",
                  "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.10-1.el8ev?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmetalink-0:0.1.3-7.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src"
        },
        "product_reference": "libmetalink-0:0.1.3-7.el8.src",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmetalink-0:0.1.3-7.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64"
        },
        "product_reference": "libmetalink-0:0.1.3-7.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmetalink-debuginfo-0:0.1.3-7.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64"
        },
        "product_reference": "libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmetalink-debugsource-0:0.1.3-7.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64"
        },
        "product_reference": "libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmetalink-devel-0:0.1.3-7.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64"
        },
        "product_reference": "libmetalink-devel-0:0.1.3-7.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.4.10-202202081536_8.5.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wget-0:1.19.5-10.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src"
        },
        "product_reference": "wget-0:1.19.5-10.el8.src",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wget-0:1.19.5-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64"
        },
        "product_reference": "wget-0:1.19.5-10.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wget-debuginfo-0:1.19.5-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64"
        },
        "product_reference": "wget-debuginfo-0:1.19.5-10.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wget-debugsource-0:1.19.5-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64"
        },
        "product_reference": "wget-debugsource-0:1.19.5-10.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-15T11:01:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0540"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Kirill Tkhai"
          ],
          "organization": "Virtuozzo Kernel team"
        }
      ],
      "cve": "CVE-2021-4155",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "discovery_date": "2021-12-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2034813"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4155"
        },
        {
          "category": "external",
          "summary": "RHBZ#2034813",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
        }
      ],
      "release_date": "2022-01-10T06:36:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-15T11:01:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0540"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script  (which resets \"0\" with  XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6  ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6  ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n     # yum install -y systemtap systemtap-runtime\n     # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n    # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n    # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
    },
    {
      "cve": "CVE-2021-45417",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-01-16T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2041489"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer overflow vulnerability in the base64 functions of AIDE, an advanced intrusion detection system. An attacker could crash the program and possibly execute arbitrary code through large (\u003c16k) extended file attributes or ACL.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "aide: heap-based buffer overflow on outputs larger than B64_BUF",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-45417"
        },
        {
          "category": "external",
          "summary": "RHBZ#2041489",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45417",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-45417"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45417",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45417"
        }
      ],
      "release_date": "2022-01-20T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-15T11:01:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0540"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "aide: heap-based buffer overflow on outputs larger than B64_BUF"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "William Liu"
          ],
          "organization": "willsroot@protonmail.com"
        },
        {
          "names": [
            "Jamie Hill-Daniel"
          ],
          "organization": "jamie@hill-daniel.co.uk"
        },
        {
          "names": [
            "Isaac Badipe"
          ],
          "organization": "isaac.badipe@gmail.com"
        },
        {
          "names": [
            "Alec Petridis"
          ],
          "organization": "alecthechop@gmail.com"
        },
        {
          "names": [
            "Hrvoje Mi\u0161eti\u0107"
          ],
          "organization": "misetichrvoje@gmail.com"
        },
        {
          "names": [
            "Philip Papurt"
          ],
          "organization": "g@gnk.io"
        }
      ],
      "cve": "CVE-2022-0185",
      "cwe": {
        "id": "CWE-191",
        "name": "Integer Underflow (Wrap or Wraparound)"
      },
      "discovery_date": "2022-01-13T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2040358"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fs_context: heap overflow in legacy parameter handling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 8.4 GA onwards. Previous Red Hat Enterprise Linux versions are not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0185"
        },
        {
          "category": "external",
          "summary": "RHBZ#2040358",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040358"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0185",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0185"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0185",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0185"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2"
        },
        {
          "category": "external",
          "summary": "https://github.com/Crusaders-of-Rust/CVE-2022-0185",
          "url": "https://github.com/Crusaders-of-Rust/CVE-2022-0185"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/7",
          "url": "https://www.openwall.com/lists/oss-security/2022/01/18/7"
        },
        {
          "category": "external",
          "summary": "https://www.willsroot.io/2022/01/cve-2022-0185.html",
          "url": "https://www.willsroot.io/2022/01/cve-2022-0185.html"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-18T18:41:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-15T11:01:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0540"
        },
        {
          "category": "workaround",
          "details": "On non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2024-08-21T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fs_context: heap overflow in legacy parameter handling"
    }
  ]
}
  rhsa-2022:0540
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\n* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)\n\n* aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417)\n\n* kernel: fs_context: heap overflow in legacy parameter handling (CVE-2022-0185)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Rebased wget package and its dependencies for the same version shipped with recent RHEL. (BZ#2030082)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0540",
        "url": "https://access.redhat.com/errata/RHSA-2022:0540"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "external",
        "summary": "2030082",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030082"
      },
      {
        "category": "external",
        "summary": "2034685",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034685"
      },
      {
        "category": "external",
        "summary": "2034813",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
      },
      {
        "category": "external",
        "summary": "2040358",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040358"
      },
      {
        "category": "external",
        "summary": "2041489",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0540.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.4.10-1]",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:20+00:00",
      "generator": {
        "date": "2025-10-09T21:42:20+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0540",
      "initial_release_date": "2022-02-15T11:01:25+00:00",
      "revision_history": [
        {
          "date": "2022-02-15T11:01:25+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-02-15T11:01:25+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:20+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
                "product": {
                  "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
                  "product_id": "8Base-RHV-Hypervisor-4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
                "product": {
                  "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
                  "product_id": "8Base-RHV-HypervisorBuild-4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wget-0:1.19.5-10.el8.x86_64",
                "product": {
                  "name": "wget-0:1.19.5-10.el8.x86_64",
                  "product_id": "wget-0:1.19.5-10.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wget-debugsource-0:1.19.5-10.el8.x86_64",
                "product": {
                  "name": "wget-debugsource-0:1.19.5-10.el8.x86_64",
                  "product_id": "wget-debugsource-0:1.19.5-10.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-10.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wget-debuginfo-0:1.19.5-10.el8.x86_64",
                "product": {
                  "name": "wget-debuginfo-0:1.19.5-10.el8.x86_64",
                  "product_id": "wget-debuginfo-0:1.19.5-10.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-10.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libmetalink-0:0.1.3-7.el8.x86_64",
                "product": {
                  "name": "libmetalink-0:0.1.3-7.el8.x86_64",
                  "product_id": "libmetalink-0:0.1.3-7.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libmetalink@0.1.3-7.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libmetalink-devel-0:0.1.3-7.el8.x86_64",
                "product": {
                  "name": "libmetalink-devel-0:0.1.3-7.el8.x86_64",
                  "product_id": "libmetalink-devel-0:0.1.3-7.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libmetalink-devel@0.1.3-7.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
                "product": {
                  "name": "libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
                  "product_id": "libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libmetalink-debugsource@0.1.3-7.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
                "product": {
                  "name": "libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
                  "product_id": "libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libmetalink-debuginfo@0.1.3-7.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.10-1.el8ev?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
                "product": {
                  "name": "redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
                  "product_id": "redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.4.10-1.el8ev?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
                "product": {
                  "name": "redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
                  "product_id": "redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.10-202202081536_8.5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wget-0:1.19.5-10.el8.src",
                "product": {
                  "name": "wget-0:1.19.5-10.el8.src",
                  "product_id": "wget-0:1.19.5-10.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libmetalink-0:0.1.3-7.el8.src",
                "product": {
                  "name": "libmetalink-0:0.1.3-7.el8.src",
                  "product_id": "libmetalink-0:0.1.3-7.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libmetalink@0.1.3-7.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
                "product": {
                  "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
                  "product_id": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.10-1.el8ev?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
                "product": {
                  "name": "redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
                  "product_id": "redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.10-202202081536_8.5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch",
                "product": {
                  "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch",
                  "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.10-1.el8ev?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmetalink-0:0.1.3-7.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src"
        },
        "product_reference": "libmetalink-0:0.1.3-7.el8.src",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmetalink-0:0.1.3-7.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64"
        },
        "product_reference": "libmetalink-0:0.1.3-7.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmetalink-debuginfo-0:0.1.3-7.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64"
        },
        "product_reference": "libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmetalink-debugsource-0:0.1.3-7.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64"
        },
        "product_reference": "libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmetalink-devel-0:0.1.3-7.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64"
        },
        "product_reference": "libmetalink-devel-0:0.1.3-7.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-0:4.4.10-202202081536_8.5.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src"
        },
        "product_reference": "redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
        },
        "product_reference": "redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wget-0:1.19.5-10.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src"
        },
        "product_reference": "wget-0:1.19.5-10.el8.src",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wget-0:1.19.5-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64"
        },
        "product_reference": "wget-0:1.19.5-10.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wget-debuginfo-0:1.19.5-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64"
        },
        "product_reference": "wget-debuginfo-0:1.19.5-10.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wget-debugsource-0:1.19.5-10.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
          "product_id": "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64"
        },
        "product_reference": "wget-debugsource-0:1.19.5-10.el8.x86_64",
        "relates_to_product_reference": "8Base-RHV-Hypervisor-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64"
        },
        "product_reference": "redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
          "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
        },
        "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch",
        "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-15T11:01:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0540"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Kirill Tkhai"
          ],
          "organization": "Virtuozzo Kernel team"
        }
      ],
      "cve": "CVE-2021-4155",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "discovery_date": "2021-12-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2034813"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4155"
        },
        {
          "category": "external",
          "summary": "RHBZ#2034813",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4155",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79"
        }
      ],
      "release_date": "2022-01-10T06:36:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-15T11:01:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0540"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by ensuring xfs_alloc_file_space is not called with \"0\" as an argument.\n\nThis can be done with a SystemTap script  (which resets \"0\" with  XFS_BMAPI_PREALLOC), below are the steps:\n\n1) Save the following script in a \u0027CVE-2021-4155.stp\u0027 file\n\n--- On Red Hat Enterprise Linux 6  ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x40;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 6  ---\n\n--- On Red Hat Enterprise Linux 7 onwards ---\nprobe module(\"xfs\").function(\"xfs_alloc_file_space\") {\n\tif ($alloc_type == 0)\n\t\t$alloc_type = 0x8;\t# XFS_BMAPI_PREALLOC\n}\n--- On Red Hat Enterprise Linux 7 onwards ---\n\n2) Install systemtap package and its dependencies\n\n     # yum install -y systemtap systemtap-runtime\n     # yum install -y kernel-devel kernel-debuginfo\n\n3) Build the mitigation kernel module as root.\n\n    # stap -r `uname -r` -m cve_2021_4155.ko -g CVE-2021-4155.stp -p4\n\n4) Load the mitigation module as root\n\n    # staprun -L cve_2021_4155.ko\n\n\n\nWhat is SystemTap and how to use it?\nhttps://access.redhat.com/solutions/5441",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL"
    },
    {
      "cve": "CVE-2021-45417",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-01-16T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2041489"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer overflow vulnerability in the base64 functions of AIDE, an advanced intrusion detection system. An attacker could crash the program and possibly execute arbitrary code through large (\u003c16k) extended file attributes or ACL.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "aide: heap-based buffer overflow on outputs larger than B64_BUF",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-45417"
        },
        {
          "category": "external",
          "summary": "RHBZ#2041489",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45417",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-45417"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45417",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45417"
        }
      ],
      "release_date": "2022-01-20T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-15T11:01:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0540"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "aide: heap-based buffer overflow on outputs larger than B64_BUF"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "William Liu"
          ],
          "organization": "willsroot@protonmail.com"
        },
        {
          "names": [
            "Jamie Hill-Daniel"
          ],
          "organization": "jamie@hill-daniel.co.uk"
        },
        {
          "names": [
            "Isaac Badipe"
          ],
          "organization": "isaac.badipe@gmail.com"
        },
        {
          "names": [
            "Alec Petridis"
          ],
          "organization": "alecthechop@gmail.com"
        },
        {
          "names": [
            "Hrvoje Mi\u0161eti\u0107"
          ],
          "organization": "misetichrvoje@gmail.com"
        },
        {
          "names": [
            "Philip Papurt"
          ],
          "organization": "g@gnk.io"
        }
      ],
      "cve": "CVE-2022-0185",
      "cwe": {
        "id": "CWE-191",
        "name": "Integer Underflow (Wrap or Wraparound)"
      },
      "discovery_date": "2022-01-13T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2040358"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fs_context: heap overflow in legacy parameter handling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 8.4 GA onwards. Previous Red Hat Enterprise Linux versions are not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
          "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
        ],
        "known_not_affected": [
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
          "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
          "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
          "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0185"
        },
        {
          "category": "external",
          "summary": "RHBZ#2040358",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040358"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0185",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0185"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0185",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0185"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2"
        },
        {
          "category": "external",
          "summary": "https://github.com/Crusaders-of-Rust/CVE-2022-0185",
          "url": "https://github.com/Crusaders-of-Rust/CVE-2022-0185"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/7",
          "url": "https://www.openwall.com/lists/oss-security/2022/01/18/7"
        },
        {
          "category": "external",
          "summary": "https://www.willsroot.io/2022/01/cve-2022-0185.html",
          "url": "https://www.willsroot.io/2022/01/cve-2022-0185.html"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-18T18:41:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-15T11:01:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0540"
        },
        {
          "category": "workaround",
          "details": "On non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
          "product_ids": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.src",
            "8Base-RHV-Hypervisor-4:libmetalink-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debuginfo-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-debugsource-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:libmetalink-devel-0:0.1.3-7.el8.x86_64",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.10-202202081536_8.5.src",
            "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.10-202202081536_8.5.x86_64",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.src",
            "8Base-RHV-Hypervisor-4:wget-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debuginfo-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-Hypervisor-4:wget-debugsource-0:1.19.5-10.el8.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.src",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.4.10-1.el8ev.x86_64",
            "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.10-1.el8ev.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2024-08-21T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fs_context: heap overflow in legacy parameter handling"
    }
  ]
}
  rhsa-2022:0273
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for polkit is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.\n\nSecurity Fix(es):\n\n* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:0273",
        "url": "https://access.redhat.com/errata/RHSA-2022:0273"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
      },
      {
        "category": "external",
        "summary": "2025869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0273.json"
      }
    ],
    "title": "Red Hat Security Advisory: polkit security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:42:14+00:00",
      "generator": {
        "date": "2025-10-09T21:42:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:0273",
      "initial_release_date": "2022-01-25T19:07:00+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T19:07:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-01-25T19:07:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:42:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                  "product_id": "7Server-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                  "product_id": "7Server-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                  "product_id": "7Server-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-22.el7_7.2.src",
                "product": {
                  "name": "polkit-0:0.112-22.el7_7.2.src",
                  "product_id": "polkit-0:0.112-22.el7_7.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-22.el7_7.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-22.el7_7.2.x86_64",
                "product": {
                  "name": "polkit-0:0.112-22.el7_7.2.x86_64",
                  "product_id": "polkit-0:0.112-22.el7_7.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-22.el7_7.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
                "product": {
                  "name": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
                  "product_id": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-22.el7_7.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
                  "product_id": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-22.el7_7.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-22.el7_7.2.i686",
                "product": {
                  "name": "polkit-0:0.112-22.el7_7.2.i686",
                  "product_id": "polkit-0:0.112-22.el7_7.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-22.el7_7.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-22.el7_7.2.i686",
                "product": {
                  "name": "polkit-devel-0:0.112-22.el7_7.2.i686",
                  "product_id": "polkit-devel-0:0.112-22.el7_7.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-22.el7_7.2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
                  "product_id": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-22.el7_7.2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-docs-0:0.112-22.el7_7.2.noarch",
                "product": {
                  "name": "polkit-docs-0:0.112-22.el7_7.2.noarch",
                  "product_id": "polkit-docs-0:0.112-22.el7_7.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-docs@0.112-22.el7_7.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-0:0.112-22.el7_7.2.ppc64le",
                "product": {
                  "name": "polkit-0:0.112-22.el7_7.2.ppc64le",
                  "product_id": "polkit-0:0.112-22.el7_7.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit@0.112-22.el7_7.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0:0.112-22.el7_7.2.ppc64le",
                "product": {
                  "name": "polkit-devel-0:0.112-22.el7_7.2.ppc64le",
                  "product_id": "polkit-devel-0:0.112-22.el7_7.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-devel@0.112-22.el7_7.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
                "product": {
                  "name": "polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
                  "product_id": "polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/polkit-debuginfo@0.112-22.el7_7.2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.src"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.src",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-22.el7_7.2.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-22.el7_7.2.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.ppc64le"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.src"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.ppc64le"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-22.el7_7.2.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:polkit-docs-0:0.112-22.el7_7.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-22.el7_7.2.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.src"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.src",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.i686"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.i686",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0:0.112-22.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.x86_64"
        },
        "product_reference": "polkit-devel-0:0.112-22.el7_7.2.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-docs-0:0.112-22.el7_7.2.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
        },
        "product_reference": "polkit-docs-0:0.112-22.el7_7.2.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Qualys Research Labs"
          ]
        }
      ],
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2025869"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.src",
          "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.AUS:polkit-docs-0:0.112-22.el7_7.2.noarch",
          "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.ppc64le",
          "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.src",
          "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
          "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.ppc64le",
          "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.E4S:polkit-docs-0:0.112-22.el7_7.2.noarch",
          "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.src",
          "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.i686",
          "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
          "7Server-7.7.TUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "RHBZ#2025869",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-001",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4034",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2022-01-25T17:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-25T19:07:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:0273"
        },
        {
          "category": "workaround",
          "details": "For customers who cannot update immediately and doesn\u0027t have Secure Boot feature enabled, the issue can be mitigated by executing the following steps:\n\n1)    Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441\n\n2)    Install polkit debug info:\n    ~~~\n    debuginfo-install polkit\n    ~~~\n\n3)    Create the following systemtap script, and name it pkexec-block.stp:\n    ~~~\n    probe process(\"/usr/bin/pkexec\").function(\"main\")  {\n        if (cmdline_arg(1) == \"\")\n                        raise(9);\n}\n~~~\n\n4) Load the systemtap module into the running kernel:\n    ~~~\n    stap -g -F -m stap_pkexec_block pkexec_block.stp\n    ~~~\n\n5) Ensure the module is loaded:\n    ~~~\n     lsmod | grep -i stap_pkexec_block\nstap_pkexec_block     434176  0\n~~~\n\n6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running:\n    ~~~\n    rmmod stap_pkexec_block\n    ~~~\n\nThis mitigation doesn\u0027t work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module\nwith a key enrolled into the Kernel\u0027s keyring.",
          "product_ids": [
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.AUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.AUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.AUS:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.E4S:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.ppc64le",
            "7Server-7.7.E4S:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.E4S:polkit-docs-0:0.112-22.el7_7.2.noarch",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.src",
            "7Server-7.7.TUS:polkit-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-debuginfo-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.i686",
            "7Server-7.7.TUS:polkit-devel-0:0.112-22.el7_7.2.x86_64",
            "7Server-7.7.TUS:polkit-docs-0:0.112-22.el7_7.2.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-06-27T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector"
    }
  ]
}
  ICSA-23-075-01
Vulnerability from csaf_cisa
Notes
{
  "document": {
    "acknowledgments": [
      {
        "organization": "Siemens ProductCERT",
        "summary": "reporting these vulnerabilities to CISA."
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://us-cert.cisa.gov/tlp/"
      }
    },
    "notes": [
      {
        "category": "summary",
        "text": "Multiple third-party component vulnerabilities were reported for the Busybox applet, the Linux Kernel, OpenSSL, OpenVPN and various other components used by the RUGGEDCOM and SCALANCE products. The vulnerabilities range from improper neutralization of special elements to improper handling of commands under certain circumstances, that could lead to code injection and denial of service.\n\nSiemens has released updates for the affected products and recommends to update to the latest versions.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
        "title": "Terms of Use"
      },
      {
        "category": "legal_disclaimer",
        "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
        "title": "Legal Notice"
      },
      {
        "category": "other",
        "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
        "title": "Advisory Conversion Disclaimer"
      },
      {
        "category": "other",
        "text": "Multiple",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Germany",
        "title": "Company headquarters location"
      },
      {
        "category": "general",
        "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "central@cisa.dhs.gov",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-419740: Multiple\tThird-Party Component Vulnerabilities in RUGGEDCOM and SCALANCE Products before V7.2 - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-419740.json"
      },
      {
        "category": "self",
        "summary": "SSA-419740: Multiple\tThird-Party Component Vulnerabilities in RUGGEDCOM and SCALANCE Products before V7.2 - TXT Version",
        "url": "https://cert-portal.siemens.com/productcert/txt/ssa-419740.txt"
      },
      {
        "category": "self",
        "summary": "SSA-419740: Multiple\tThird-Party Component Vulnerabilities in RUGGEDCOM and SCALANCE Products before V7.2 - PDF Version",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419740.pdf"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-23-075-01 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-075-01.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-23-075-01 - Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/topics/industrial-control-systems"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
      }
    ],
    "title": "Siemens SCALANCE, RUGGEDCOM Third-Party",
    "tracking": {
      "current_release_date": "2023-03-14T00:00:00.000000Z",
      "generator": {
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.0.0"
        }
      },
      "id": "ICSA-23-075-01",
      "initial_release_date": "2023-03-14T00:00:00.000000Z",
      "revision_history": [
        {
          "date": "2023-03-14T00:00:00.000000Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)",
                  "product_id": "CSAFPID-0001",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK6108-4AM00-2BA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)",
                  "product_id": "CSAFPID-0002",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK6108-4AM00-2DA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)",
                  "product_id": "CSAFPID-0003",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5804-0AP00-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)",
                  "product_id": "CSAFPID-0004",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5812-1AA00-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)",
                  "product_id": "CSAFPID-0005",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5812-1BA00-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)",
                  "product_id": "CSAFPID-0006",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5816-1AA00-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)",
                  "product_id": "CSAFPID-0007",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5816-1BA00-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)",
                  "product_id": "CSAFPID-0008",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5826-2AB00-2AB2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)",
                  "product_id": "CSAFPID-0009",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5874-2AA00-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)",
                  "product_id": "CSAFPID-0010",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5874-3AA00-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)",
                  "product_id": "CSAFPID-0011",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5876-3AA02-2BA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)",
                  "product_id": "CSAFPID-0012",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5876-3AA02-2EA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)",
                  "product_id": "CSAFPID-0013",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5876-4AA10-2BA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)",
                  "product_id": "CSAFPID-0014",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5876-4AA00-2BA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)",
                  "product_id": "CSAFPID-0015",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5876-4AA00-2DA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)",
                  "product_id": "CSAFPID-0016",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5853-2EA00-2DA1"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)",
                  "product_id": "CSAFPID-0017",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5856-2EA00-3DA1"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)",
                  "product_id": "CSAFPID-0018",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5856-2EA00-3AA1"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE S615 (6GK5615-0AA00-2AA2)",
                  "product_id": "CSAFPID-0019",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5615-0AA00-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE S615 (6GK5615-0AA00-2AA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2)",
                  "product_id": "CSAFPID-0020",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5615-0AA01-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2)"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2018-25032",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2018-25032"
    },
    {
      "cve": "CVE-2019-1125",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka \u0027Windows Kernel Information Disclosure Vulnerability\u0027. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2019-1125"
    },
    {
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-4034"
    },
    {
      "cve": "CVE-2021-4149",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in btrfs_alloc_tree_b in fs/btrfs/extent-tree.c in the Linux kernel due to an improper lock operation in btrfs. In this flaw, a user with a local privilege may cause a denial of service (DOS) due to a deadlock problem.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-4149"
    },
    {
      "cve": "CVE-2021-26401",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-26401"
    },
    {
      "cve": "CVE-2021-42373",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42373"
    },
    {
      "cve": "CVE-2021-42374",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42374"
    },
    {
      "cve": "CVE-2021-42375",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42375"
    },
    {
      "cve": "CVE-2021-42376",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42376"
    },
    {
      "cve": "CVE-2021-42377",
      "cwe": {
        "id": "CWE-763",
        "name": "Release of Invalid Pointer or Reference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42377"
    },
    {
      "cve": "CVE-2021-42378",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42378"
    },
    {
      "cve": "CVE-2021-42379",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42379"
    },
    {
      "cve": "CVE-2021-42380",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42380"
    },
    {
      "cve": "CVE-2021-42381",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42381"
    },
    {
      "cve": "CVE-2021-42382",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42382"
    },
    {
      "cve": "CVE-2021-42383",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42383"
    },
    {
      "cve": "CVE-2021-42384",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42384"
    },
    {
      "cve": "CVE-2021-42385",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42385"
    },
    {
      "cve": "CVE-2021-42386",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42386"
    },
    {
      "cve": "CVE-2022-0001",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-0001"
    },
    {
      "cve": "CVE-2022-0002",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-0002"
    },
    {
      "cve": "CVE-2022-0494",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-0494"
    },
    {
      "cve": "CVE-2022-0547",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "notes": [
        {
          "category": "summary",
          "text": "OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-0547"
    },
    {
      "cve": "CVE-2022-1011",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1011"
    },
    {
      "cve": "CVE-2022-1016",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle \u0027return\u0027 with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1016"
    },
    {
      "cve": "CVE-2022-1198",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1198"
    },
    {
      "cve": "CVE-2022-1199",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1199"
    },
    {
      "cve": "CVE-2022-1292",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1292"
    },
    {
      "cve": "CVE-2022-1304",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1304"
    },
    {
      "cve": "CVE-2022-1343",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the varification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1343"
    },
    {
      "cve": "CVE-2022-1353",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1353"
    },
    {
      "cve": "CVE-2022-1473",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1473"
    },
    {
      "cve": "CVE-2022-1516",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1516"
    },
    {
      "cve": "CVE-2022-1652",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1652"
    },
    {
      "cve": "CVE-2022-1729",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1729"
    },
    {
      "cve": "CVE-2022-1734",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1734"
    },
    {
      "cve": "CVE-2022-1974",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1974"
    },
    {
      "cve": "CVE-2022-1975",
      "cwe": {
        "id": "CWE-248",
        "name": "Uncaught Exception"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1975"
    },
    {
      "cve": "CVE-2022-2380",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The Linux kernel was found vulnerable out of bounds memory access in the drivers/video/fbdev/sm712fb.c:smtcfb_read() function. The vulnerability could result in local attackers being able to crash the kernel.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-2380"
    },
    {
      "cve": "CVE-2022-2588",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-2588"
    },
    {
      "cve": "CVE-2022-2639",
      "cwe": {
        "id": "CWE-191",
        "name": "Integer Underflow (Wrap or Wraparound)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-2639"
    },
    {
      "cve": "CVE-2022-20158",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In bdi_put and bdi_unregister of backing-dev.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182815710References: Upstream kernel",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-20158"
    },
    {
      "cve": "CVE-2022-23036",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-23036"
    },
    {
      "cve": "CVE-2022-23037",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-23037"
    },
    {
      "cve": "CVE-2022-23038",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-23038"
    },
    {
      "cve": "CVE-2022-23039",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-23039"
    },
    {
      "cve": "CVE-2022-23040",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-23040"
    },
    {
      "cve": "CVE-2022-23041",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-23041"
    },
    {
      "cve": "CVE-2022-23042",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-23042"
    },
    {
      "cve": "CVE-2022-23308",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-23308"
    },
    {
      "cve": "CVE-2022-26490",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-26490"
    },
    {
      "cve": "CVE-2022-28356",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-28356"
    },
    {
      "cve": "CVE-2022-28390",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-28390"
    },
    {
      "cve": "CVE-2022-30065",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in Busybox 1.35-x\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-30065"
    },
    {
      "cve": "CVE-2022-30594",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-30594"
    },
    {
      "cve": "CVE-2022-32205",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A malicious server can serve excessive amounts of \"Set-Cookie:\" headers in a HTTP response to curl and curl \u003c 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven\u0027t expired. Due to cookie matching rules, a server on \"foo.example.com\" can set cookies that also would match for \"bar.example.com\", making it it possible for a \"sister server\" to effectively cause a denial of service for a sibling site on the same second level domain using this method.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-32205"
    },
    {
      "cve": "CVE-2022-32206",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl \u003c 7.84.0 supports \"chained\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \"malloc bomb\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-32206"
    },
    {
      "cve": "CVE-2022-32207",
      "cwe": {
        "id": "CWE-276",
        "name": "Incorrect Default Permissions"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-32207"
    },
    {
      "cve": "CVE-2022-32208",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-32208"
    },
    {
      "cve": "CVE-2022-32296",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-32296"
    },
    {
      "cve": "CVE-2022-32981",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in the Linux kernel through 5.18.3 on powerpc 32-bit platforms. There is a buffer overflow in ptrace PEEKUSER and POKEUSER (aka PEEKUSR and POKEUSR) when accessing floating point registers.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-32981"
    },
    {
      "cve": "CVE-2022-33981",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-33981"
    },
    {
      "cve": "CVE-2022-35252",
      "cwe": {
        "id": "CWE-1286",
        "name": "Improper Validation of Syntactic Correctness of Input"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\"sister site\" to deny service to all siblings.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-35252"
    },
    {
      "cve": "CVE-2022-36879",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-36879"
    },
    {
      "cve": "CVE-2022-36946",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-36946"
    }
  ]
}
  icsa-23-075-01
Vulnerability from csaf_cisa
Notes
{
  "document": {
    "acknowledgments": [
      {
        "organization": "Siemens ProductCERT",
        "summary": "reporting these vulnerabilities to CISA."
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://us-cert.cisa.gov/tlp/"
      }
    },
    "notes": [
      {
        "category": "summary",
        "text": "Multiple third-party component vulnerabilities were reported for the Busybox applet, the Linux Kernel, OpenSSL, OpenVPN and various other components used by the RUGGEDCOM and SCALANCE products. The vulnerabilities range from improper neutralization of special elements to improper handling of commands under certain circumstances, that could lead to code injection and denial of service.\n\nSiemens has released updates for the affected products and recommends to update to the latest versions.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
        "title": "Terms of Use"
      },
      {
        "category": "legal_disclaimer",
        "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
        "title": "Legal Notice"
      },
      {
        "category": "other",
        "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
        "title": "Advisory Conversion Disclaimer"
      },
      {
        "category": "other",
        "text": "Multiple",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Germany",
        "title": "Company headquarters location"
      },
      {
        "category": "general",
        "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "central@cisa.dhs.gov",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-419740: Multiple\tThird-Party Component Vulnerabilities in RUGGEDCOM and SCALANCE Products before V7.2 - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-419740.json"
      },
      {
        "category": "self",
        "summary": "SSA-419740: Multiple\tThird-Party Component Vulnerabilities in RUGGEDCOM and SCALANCE Products before V7.2 - TXT Version",
        "url": "https://cert-portal.siemens.com/productcert/txt/ssa-419740.txt"
      },
      {
        "category": "self",
        "summary": "SSA-419740: Multiple\tThird-Party Component Vulnerabilities in RUGGEDCOM and SCALANCE Products before V7.2 - PDF Version",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419740.pdf"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-23-075-01 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-075-01.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-23-075-01 - Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/topics/industrial-control-systems"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
      }
    ],
    "title": "Siemens SCALANCE, RUGGEDCOM Third-Party",
    "tracking": {
      "current_release_date": "2023-03-14T00:00:00.000000Z",
      "generator": {
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.0.0"
        }
      },
      "id": "ICSA-23-075-01",
      "initial_release_date": "2023-03-14T00:00:00.000000Z",
      "revision_history": [
        {
          "date": "2023-03-14T00:00:00.000000Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)",
                  "product_id": "CSAFPID-0001",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK6108-4AM00-2BA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)",
                  "product_id": "CSAFPID-0002",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK6108-4AM00-2DA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)",
                  "product_id": "CSAFPID-0003",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5804-0AP00-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)",
                  "product_id": "CSAFPID-0004",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5812-1AA00-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)",
                  "product_id": "CSAFPID-0005",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5812-1BA00-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)",
                  "product_id": "CSAFPID-0006",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5816-1AA00-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)",
                  "product_id": "CSAFPID-0007",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5816-1BA00-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)",
                  "product_id": "CSAFPID-0008",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5826-2AB00-2AB2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)",
                  "product_id": "CSAFPID-0009",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5874-2AA00-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)",
                  "product_id": "CSAFPID-0010",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5874-3AA00-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)",
                  "product_id": "CSAFPID-0011",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5876-3AA02-2BA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)",
                  "product_id": "CSAFPID-0012",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5876-3AA02-2EA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)",
                  "product_id": "CSAFPID-0013",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5876-4AA10-2BA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)",
                  "product_id": "CSAFPID-0014",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5876-4AA00-2BA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)",
                  "product_id": "CSAFPID-0015",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5876-4AA00-2DA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)",
                  "product_id": "CSAFPID-0016",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5853-2EA00-2DA1"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)",
                  "product_id": "CSAFPID-0017",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5856-2EA00-3DA1"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)",
                  "product_id": "CSAFPID-0018",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5856-2EA00-3AA1"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE S615 (6GK5615-0AA00-2AA2)",
                  "product_id": "CSAFPID-0019",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5615-0AA00-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE S615 (6GK5615-0AA00-2AA2)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV7.2",
                "product": {
                  "name": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2)",
                  "product_id": "CSAFPID-0020",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5615-0AA01-2AA2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2)"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2018-25032",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2018-25032"
    },
    {
      "cve": "CVE-2019-1125",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka \u0027Windows Kernel Information Disclosure Vulnerability\u0027. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2019-1125"
    },
    {
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-4034"
    },
    {
      "cve": "CVE-2021-4149",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in btrfs_alloc_tree_b in fs/btrfs/extent-tree.c in the Linux kernel due to an improper lock operation in btrfs. In this flaw, a user with a local privilege may cause a denial of service (DOS) due to a deadlock problem.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-4149"
    },
    {
      "cve": "CVE-2021-26401",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-26401"
    },
    {
      "cve": "CVE-2021-42373",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42373"
    },
    {
      "cve": "CVE-2021-42374",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42374"
    },
    {
      "cve": "CVE-2021-42375",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42375"
    },
    {
      "cve": "CVE-2021-42376",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42376"
    },
    {
      "cve": "CVE-2021-42377",
      "cwe": {
        "id": "CWE-763",
        "name": "Release of Invalid Pointer or Reference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42377"
    },
    {
      "cve": "CVE-2021-42378",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42378"
    },
    {
      "cve": "CVE-2021-42379",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42379"
    },
    {
      "cve": "CVE-2021-42380",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42380"
    },
    {
      "cve": "CVE-2021-42381",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42381"
    },
    {
      "cve": "CVE-2021-42382",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42382"
    },
    {
      "cve": "CVE-2021-42383",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42383"
    },
    {
      "cve": "CVE-2021-42384",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42384"
    },
    {
      "cve": "CVE-2021-42385",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42385"
    },
    {
      "cve": "CVE-2021-42386",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2021-42386"
    },
    {
      "cve": "CVE-2022-0001",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-0001"
    },
    {
      "cve": "CVE-2022-0002",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-0002"
    },
    {
      "cve": "CVE-2022-0494",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-0494"
    },
    {
      "cve": "CVE-2022-0547",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "notes": [
        {
          "category": "summary",
          "text": "OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-0547"
    },
    {
      "cve": "CVE-2022-1011",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1011"
    },
    {
      "cve": "CVE-2022-1016",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle \u0027return\u0027 with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1016"
    },
    {
      "cve": "CVE-2022-1198",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1198"
    },
    {
      "cve": "CVE-2022-1199",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1199"
    },
    {
      "cve": "CVE-2022-1292",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1292"
    },
    {
      "cve": "CVE-2022-1304",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1304"
    },
    {
      "cve": "CVE-2022-1343",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the varification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1343"
    },
    {
      "cve": "CVE-2022-1353",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1353"
    },
    {
      "cve": "CVE-2022-1473",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1473"
    },
    {
      "cve": "CVE-2022-1516",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1516"
    },
    {
      "cve": "CVE-2022-1652",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1652"
    },
    {
      "cve": "CVE-2022-1729",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1729"
    },
    {
      "cve": "CVE-2022-1734",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1734"
    },
    {
      "cve": "CVE-2022-1974",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1974"
    },
    {
      "cve": "CVE-2022-1975",
      "cwe": {
        "id": "CWE-248",
        "name": "Uncaught Exception"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-1975"
    },
    {
      "cve": "CVE-2022-2380",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The Linux kernel was found vulnerable out of bounds memory access in the drivers/video/fbdev/sm712fb.c:smtcfb_read() function. The vulnerability could result in local attackers being able to crash the kernel.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-2380"
    },
    {
      "cve": "CVE-2022-2588",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-2588"
    },
    {
      "cve": "CVE-2022-2639",
      "cwe": {
        "id": "CWE-191",
        "name": "Integer Underflow (Wrap or Wraparound)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-2639"
    },
    {
      "cve": "CVE-2022-20158",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In bdi_put and bdi_unregister of backing-dev.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182815710References: Upstream kernel",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-20158"
    },
    {
      "cve": "CVE-2022-23036",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-23036"
    },
    {
      "cve": "CVE-2022-23037",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-23037"
    },
    {
      "cve": "CVE-2022-23038",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-23038"
    },
    {
      "cve": "CVE-2022-23039",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-23039"
    },
    {
      "cve": "CVE-2022-23040",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-23040"
    },
    {
      "cve": "CVE-2022-23041",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-23041"
    },
    {
      "cve": "CVE-2022-23042",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-23042"
    },
    {
      "cve": "CVE-2022-23308",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-23308"
    },
    {
      "cve": "CVE-2022-26490",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-26490"
    },
    {
      "cve": "CVE-2022-28356",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-28356"
    },
    {
      "cve": "CVE-2022-28390",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-28390"
    },
    {
      "cve": "CVE-2022-30065",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free in Busybox 1.35-x\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-30065"
    },
    {
      "cve": "CVE-2022-30594",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-30594"
    },
    {
      "cve": "CVE-2022-32205",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A malicious server can serve excessive amounts of \"Set-Cookie:\" headers in a HTTP response to curl and curl \u003c 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven\u0027t expired. Due to cookie matching rules, a server on \"foo.example.com\" can set cookies that also would match for \"bar.example.com\", making it it possible for a \"sister server\" to effectively cause a denial of service for a sibling site on the same second level domain using this method.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-32205"
    },
    {
      "cve": "CVE-2022-32206",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl \u003c 7.84.0 supports \"chained\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \"malloc bomb\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-32206"
    },
    {
      "cve": "CVE-2022-32207",
      "cwe": {
        "id": "CWE-276",
        "name": "Incorrect Default Permissions"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-32207"
    },
    {
      "cve": "CVE-2022-32208",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-32208"
    },
    {
      "cve": "CVE-2022-32296",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-32296"
    },
    {
      "cve": "CVE-2022-32981",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in the Linux kernel through 5.18.3 on powerpc 32-bit platforms. There is a buffer overflow in ptrace PEEKUSER and POKEUSER (aka PEEKUSR and POKEUSR) when accessing floating point registers.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-32981"
    },
    {
      "cve": "CVE-2022-33981",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-33981"
    },
    {
      "cve": "CVE-2022-35252",
      "cwe": {
        "id": "CWE-1286",
        "name": "Improper Validation of Syntactic Correctness of Input"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\"sister site\" to deny service to all siblings.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-35252"
    },
    {
      "cve": "CVE-2022-36879",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-36879"
    },
    {
      "cve": "CVE-2022-36946",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V7.2 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ],
          "url": "https://support.industry.siemens.com/cs/document/109817007/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020"
          ]
        }
      ],
      "title": "CVE-2022-36946"
    }
  ]
}
  ICSA-22-167-16
Vulnerability from csaf_cisa
Notes
{
  "document": {
    "acknowledgments": [
      {
        "organization": "Siemens ProductCERT",
        "summary": "reporting this vulnerability to CISA."
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://us-cert.cisa.gov/tlp/"
      }
    },
    "notes": [
      {
        "category": "summary",
        "text": "The products listed below contain a local privilege escalation vulnerability (CVE-2021-4034) found on polkit\u0027s pkexec utility, that could allow an unprivileged user to gain administrative rights.\n\nSiemens has released updates for the affected products and recommends to update to the latest versions.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
        "title": "Terms of Use"
      },
      {
        "category": "legal_disclaimer",
        "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
        "title": "Legal Notice"
      },
      {
        "category": "other",
        "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
        "title": "Advisory Conversion Disclaimer"
      },
      {
        "category": "other",
        "text": "Multiple",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Germany",
        "title": "Company headquarters location"
      },
      {
        "category": "general",
        "text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "central@cisa.dhs.gov",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-330556: PwnKit Vulnerability in SCALANCE LPE9403 and SINUMERIK Edge Products (CVE-2021-4034) - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-330556.json"
      },
      {
        "category": "self",
        "summary": "SSA-330556: PwnKit Vulnerability in SCALANCE LPE9403 and SINUMERIK Edge Products (CVE-2021-4034) - TXT Version",
        "url": "https://cert-portal.siemens.com/productcert/txt/ssa-330556.txt"
      },
      {
        "category": "self",
        "summary": "SSA-330556: PwnKit Vulnerability in SCALANCE LPE9403 and SINUMERIK Edge Products (CVE-2021-4034) - PDF Version",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-22-167-16 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-167-16.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-22-167-16 - Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-16"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/topics/industrial-control-systems"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
      }
    ],
    "title": "Siemens SCALANCE LPE 4903 and SINUMERIK Edge",
    "tracking": {
      "current_release_date": "2022-06-14T00:00:00.000000Z",
      "generator": {
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.0.0"
        }
      },
      "id": "ICSA-22-167-16",
      "initial_release_date": "2022-06-14T00:00:00.000000Z",
      "revision_history": [
        {
          "date": "2022-06-14T00:00:00.000000Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV2.0",
                "product": {
                  "name": "SCALANCE LPE9403",
                  "product_id": "CSAFPID-0001",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5998-3GS00-2AC2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE LPE9403"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV3.3.0",
                "product": {
                  "name": "SINUMERIK Edge",
                  "product_id": "CSAFPID-0002"
                }
              }
            ],
            "category": "product_name",
            "name": "SINUMERIK Edge"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002"
        ]
      },
      "references": [
        {
          "summary": "CVE-2021-4034 - SCALANCE LPE9403",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/"
        },
        {
          "summary": "CVE-2021-4034 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-4034.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V2.0 or later version",
          "product_ids": [
            "CSAFPID-0001"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.3.0 or later version",
          "product_ids": [
            "CSAFPID-0002"
          ]
        },
        {
          "category": "mitigation",
          "details": "Restrict system access to authorized personnel and follow a least privilege approach",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002"
          ]
        },
        {
          "category": "mitigation",
          "details": "Temporary mitigation exists at the expense of pkexec\u2019s capabilities. By removing SUID permissions, the program cannot run processes as root. However, any processes that rely on it for normal operation will be affected\n\n- SUID permission can be removed with chmod, as follows: chmod 0755 /usr/bin/pkexec",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002"
          ]
        }
      ],
      "title": "CVE-2021-4034"
    }
  ]
}
  ICSA-22-270-02
Vulnerability from csaf_cisa
Notes
{
  "document": {
    "acknowledgments": [
      {
        "organization": "Hitachi Energy",
        "summary": "reporting this vulnerability to CISA"
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://us-cert.cisa.gov/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
        "title": "CISA Disclaimer"
      },
      {
        "category": "legal_disclaimer",
        "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
        "title": "Legal Notice"
      },
      {
        "category": "summary",
        "text": "Successful exploitation of this vulnerability could allow users to escalate privileges from a user account to root.",
        "title": "Risk evaluation"
      },
      {
        "category": "other",
        "text": "Energy",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Switzerland",
        "title": "Company headquarters location"
      },
      {
        "category": "general",
        "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability these vulnerabilities.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "This vulnerability is not exploitable remotely.",
        "title": "Recommended Practices"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-22-270-02 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-270-02.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-22-270-02 Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-270-02"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-270-02"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
      }
    ],
    "title": "Hitachi Energy APM Edge",
    "tracking": {
      "current_release_date": "2022-09-27T00:00:00.000000Z",
      "generator": {
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.0.0"
        }
      },
      "id": "ICSA-22-270-02",
      "initial_release_date": "2022-09-27T00:00:00.000000Z",
      "revision_history": [
        {
          "date": "2022-09-27T00:00:00.000000Z",
          "legacy_version": "Initial",
          "number": "1",
          "summary": "Publication Date"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "3.0",
                "product": {
                  "name": "Lumada APM Edge: Version 3.0",
                  "product_id": "CSAFPID-0001"
                }
              }
            ],
            "category": "product_name",
            "name": "Lumada APM Edge"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "1.0",
                "product": {
                  "name": "Lumada APM Edge: Version 1.0",
                  "product_id": "CSAFPID-0002"
                }
              }
            ],
            "category": "product_name",
            "name": "Lumada APM Edge"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "4.0",
                "product": {
                  "name": "Lumada APM Edge: Version 4.0",
                  "product_id": "CSAFPID-0003"
                }
              }
            ],
            "category": "product_name",
            "name": "Lumada APM Edge"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "2.0",
                "product": {
                  "name": "Lumada APM Edge: Version 2.0",
                  "product_id": "CSAFPID-0004"
                }
              }
            ],
            "category": "product_name",
            "name": "Lumada APM Edge"
          }
        ],
        "category": "vendor",
        "name": "Hitachi Energy"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The affected product is vulnerable to a privilege escalation attack, which could allow an attacker to escalate a user account to root.CVE-2021-4034 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "web.nvd.nist.gov",
          "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "When applicable, Hitachi Energy recommends users update to Lumada APM Edge v6.3 at the earliest convenience.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "Physically protect process control systems from unauthorized direct access.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "Ensure process control systems have no direct connections to the internet.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "Use firewall systems to separate process control systems from other networks.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "Ensure the firewall system only has necessary ports exposed.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "APM should only be used to access the internet for authorized information. Portable computers and removable storage media should be carefully scanned for viruses before connecting to a control system.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "For more information, see Hitachi Energy advisory 8DBD000115.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ],
          "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000115"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2022-0492",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The affected product is vulnerable to a privilege escalation attack, which could allow an attacker to bypass the namespace isolation unexpectedly.CVE-2022-0492 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "web.nvd.nist.gov",
          "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0492"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "When applicable, Hitachi Energy recommends users update to Lumada APM Edge v6.3 at the earliest convenience.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "Physically protect process control systems from unauthorized direct access.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "Ensure process control systems have no direct connections to the internet.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "Use firewall systems to separate process control systems from other networks.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "Ensure the firewall system only has necessary ports exposed.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "APM should only be used to access the internet for authorized information. Portable computers and removable storage media should be carefully scanned for viruses before connecting to a control system.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "For more information, see Hitachi Energy advisory 8DBD000115.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ],
          "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000115"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        }
      ]
    }
  ]
}
  icsa-22-167-16
Vulnerability from csaf_cisa
Notes
{
  "document": {
    "acknowledgments": [
      {
        "organization": "Siemens ProductCERT",
        "summary": "reporting this vulnerability to CISA."
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://us-cert.cisa.gov/tlp/"
      }
    },
    "notes": [
      {
        "category": "summary",
        "text": "The products listed below contain a local privilege escalation vulnerability (CVE-2021-4034) found on polkit\u0027s pkexec utility, that could allow an unprivileged user to gain administrative rights.\n\nSiemens has released updates for the affected products and recommends to update to the latest versions.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
        "title": "Terms of Use"
      },
      {
        "category": "legal_disclaimer",
        "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
        "title": "Legal Notice"
      },
      {
        "category": "other",
        "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
        "title": "Advisory Conversion Disclaimer"
      },
      {
        "category": "other",
        "text": "Multiple",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Germany",
        "title": "Company headquarters location"
      },
      {
        "category": "general",
        "text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "central@cisa.dhs.gov",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-330556: PwnKit Vulnerability in SCALANCE LPE9403 and SINUMERIK Edge Products (CVE-2021-4034) - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-330556.json"
      },
      {
        "category": "self",
        "summary": "SSA-330556: PwnKit Vulnerability in SCALANCE LPE9403 and SINUMERIK Edge Products (CVE-2021-4034) - TXT Version",
        "url": "https://cert-portal.siemens.com/productcert/txt/ssa-330556.txt"
      },
      {
        "category": "self",
        "summary": "SSA-330556: PwnKit Vulnerability in SCALANCE LPE9403 and SINUMERIK Edge Products (CVE-2021-4034) - PDF Version",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-22-167-16 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-167-16.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-22-167-16 - Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-16"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/topics/industrial-control-systems"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
      }
    ],
    "title": "Siemens SCALANCE LPE 4903 and SINUMERIK Edge",
    "tracking": {
      "current_release_date": "2022-06-14T00:00:00.000000Z",
      "generator": {
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.0.0"
        }
      },
      "id": "ICSA-22-167-16",
      "initial_release_date": "2022-06-14T00:00:00.000000Z",
      "revision_history": [
        {
          "date": "2022-06-14T00:00:00.000000Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV2.0",
                "product": {
                  "name": "SCALANCE LPE9403",
                  "product_id": "CSAFPID-0001",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6GK5998-3GS00-2AC2"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE LPE9403"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cV3.3.0",
                "product": {
                  "name": "SINUMERIK Edge",
                  "product_id": "CSAFPID-0002"
                }
              }
            ],
            "category": "product_name",
            "name": "SINUMERIK Edge"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002"
        ]
      },
      "references": [
        {
          "summary": "CVE-2021-4034 - SCALANCE LPE9403",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/"
        },
        {
          "summary": "CVE-2021-4034 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-4034.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V2.0 or later version",
          "product_ids": [
            "CSAFPID-0001"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.3.0 or later version",
          "product_ids": [
            "CSAFPID-0002"
          ]
        },
        {
          "category": "mitigation",
          "details": "Restrict system access to authorized personnel and follow a least privilege approach",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002"
          ]
        },
        {
          "category": "mitigation",
          "details": "Temporary mitigation exists at the expense of pkexec\u2019s capabilities. By removing SUID permissions, the program cannot run processes as root. However, any processes that rely on it for normal operation will be affected\n\n- SUID permission can be removed with chmod, as follows: chmod 0755 /usr/bin/pkexec",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002"
          ]
        }
      ],
      "title": "CVE-2021-4034"
    }
  ]
}
  icsa-22-270-02
Vulnerability from csaf_cisa
Notes
{
  "document": {
    "acknowledgments": [
      {
        "organization": "Hitachi Energy",
        "summary": "reporting this vulnerability to CISA"
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://us-cert.cisa.gov/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
        "title": "CISA Disclaimer"
      },
      {
        "category": "legal_disclaimer",
        "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
        "title": "Legal Notice"
      },
      {
        "category": "summary",
        "text": "Successful exploitation of this vulnerability could allow users to escalate privileges from a user account to root.",
        "title": "Risk evaluation"
      },
      {
        "category": "other",
        "text": "Energy",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Switzerland",
        "title": "Company headquarters location"
      },
      {
        "category": "general",
        "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability these vulnerabilities.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "This vulnerability is not exploitable remotely.",
        "title": "Recommended Practices"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-22-270-02 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-270-02.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-22-270-02 Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-270-02"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-270-02"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
      }
    ],
    "title": "Hitachi Energy APM Edge",
    "tracking": {
      "current_release_date": "2022-09-27T00:00:00.000000Z",
      "generator": {
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.0.0"
        }
      },
      "id": "ICSA-22-270-02",
      "initial_release_date": "2022-09-27T00:00:00.000000Z",
      "revision_history": [
        {
          "date": "2022-09-27T00:00:00.000000Z",
          "legacy_version": "Initial",
          "number": "1",
          "summary": "Publication Date"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "3.0",
                "product": {
                  "name": "Lumada APM Edge: Version 3.0",
                  "product_id": "CSAFPID-0001"
                }
              }
            ],
            "category": "product_name",
            "name": "Lumada APM Edge"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "1.0",
                "product": {
                  "name": "Lumada APM Edge: Version 1.0",
                  "product_id": "CSAFPID-0002"
                }
              }
            ],
            "category": "product_name",
            "name": "Lumada APM Edge"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "4.0",
                "product": {
                  "name": "Lumada APM Edge: Version 4.0",
                  "product_id": "CSAFPID-0003"
                }
              }
            ],
            "category": "product_name",
            "name": "Lumada APM Edge"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "2.0",
                "product": {
                  "name": "Lumada APM Edge: Version 2.0",
                  "product_id": "CSAFPID-0004"
                }
              }
            ],
            "category": "product_name",
            "name": "Lumada APM Edge"
          }
        ],
        "category": "vendor",
        "name": "Hitachi Energy"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The affected product is vulnerable to a privilege escalation attack, which could allow an attacker to escalate a user account to root.CVE-2021-4034 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "web.nvd.nist.gov",
          "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "When applicable, Hitachi Energy recommends users update to Lumada APM Edge v6.3 at the earliest convenience.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "Physically protect process control systems from unauthorized direct access.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "Ensure process control systems have no direct connections to the internet.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "Use firewall systems to separate process control systems from other networks.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "Ensure the firewall system only has necessary ports exposed.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "APM should only be used to access the internet for authorized information. Portable computers and removable storage media should be carefully scanned for viruses before connecting to a control system.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "For more information, see Hitachi Energy advisory 8DBD000115.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ],
          "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000115"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        }
      ]
    },
    {
      "cve": "CVE-2022-0492",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The affected product is vulnerable to a privilege escalation attack, which could allow an attacker to bypass the namespace isolation unexpectedly.CVE-2022-0492 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).",
          "title": "Vulnerability Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "web.nvd.nist.gov",
          "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0492"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "When applicable, Hitachi Energy recommends users update to Lumada APM Edge v6.3 at the earliest convenience.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "Physically protect process control systems from unauthorized direct access.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "Ensure process control systems have no direct connections to the internet.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "Use firewall systems to separate process control systems from other networks.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "Ensure the firewall system only has necessary ports exposed.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "APM should only be used to access the internet for authorized information. Portable computers and removable storage media should be carefully scanned for viruses before connecting to a control system.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        },
        {
          "category": "mitigation",
          "details": "For more information, see Hitachi Energy advisory 8DBD000115.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ],
          "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000115"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004"
          ]
        }
      ]
    }
  ]
}
  wid-sec-w-2022-0302
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-0302 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0302.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-0302 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0302"
      },
      {
        "category": "external",
        "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04",
        "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf"
      },
      {
        "category": "external",
        "summary": "Xerox Security Bulletin XRX22-015",
        "url": "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-015-FreeFlow-Print-Server-v7.pdf"
      },
      {
        "category": "external",
        "summary": "Xerox Security Bulletin XRX22-013 vom 2022-06-14",
        "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-013-FreeFlow-Print-Server-v9.pdf"
      },
      {
        "category": "external",
        "summary": "Xerox Security Bulletin XRX22-012 vom 2022-06-14",
        "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-012-FreeFlow-Printer.pdf"
      }
    ],
    "source_lang": "en-US",
    "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen erm\u00f6glichen Ausf\u00fchren von beliebigem Programmcode mit Administratorrechten",
    "tracking": {
      "current_release_date": "2023-04-03T22:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:27:55.136+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2022-0302",
      "initial_release_date": "2022-06-14T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-06-14T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2022-06-21T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von XEROX aufgenommen"
        },
        {
          "date": "2023-04-03T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von XEROX aufgenommen"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Xerox FreeFlow Print Server 7",
                "product": {
                  "name": "Xerox FreeFlow Print Server 7",
                  "product_id": "T000872",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:xerox:freeflow_print_server:7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Xerox FreeFlow Print Server 9",
                "product": {
                  "name": "Xerox FreeFlow Print Server 9",
                  "product_id": "T002977",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:xerox:freeflow_print_server:9"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "FreeFlow Print Server"
          }
        ],
        "category": "vendor",
        "name": "Xerox"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-2124",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2016-2124"
    },
    {
      "cve": "CVE-2019-14822",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2019-14822"
    },
    {
      "cve": "CVE-2019-19906",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2019-19906"
    },
    {
      "cve": "CVE-2020-15250",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2020-15250"
    },
    {
      "cve": "CVE-2020-17049",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2020-17049"
    },
    {
      "cve": "CVE-2020-25717",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2020-25717"
    },
    {
      "cve": "CVE-2020-25718",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2020-25718"
    },
    {
      "cve": "CVE-2020-25719",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2020-25719"
    },
    {
      "cve": "CVE-2020-25721",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2020-25721"
    },
    {
      "cve": "CVE-2020-25722",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2020-25722"
    },
    {
      "cve": "CVE-2020-9484",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2020-9484"
    },
    {
      "cve": "CVE-2021-21707",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-21707"
    },
    {
      "cve": "CVE-2021-22926",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-22926"
    },
    {
      "cve": "CVE-2021-23192",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-23192"
    },
    {
      "cve": "CVE-2021-27815",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-27815"
    },
    {
      "cve": "CVE-2021-30846",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-30846"
    },
    {
      "cve": "CVE-2021-30848",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-30848"
    },
    {
      "cve": "CVE-2021-30849",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-30849"
    },
    {
      "cve": "CVE-2021-30851",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-30851"
    },
    {
      "cve": "CVE-2021-30858",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-30858"
    },
    {
      "cve": "CVE-2021-33430",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-33430"
    },
    {
      "cve": "CVE-2021-34141",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-34141"
    },
    {
      "cve": "CVE-2021-35604",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-35604"
    },
    {
      "cve": "CVE-2021-35624",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-35624"
    },
    {
      "cve": "CVE-2021-3572",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3572"
    },
    {
      "cve": "CVE-2021-3711",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3711"
    },
    {
      "cve": "CVE-2021-3733",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3733"
    },
    {
      "cve": "CVE-2021-3737",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3737"
    },
    {
      "cve": "CVE-2021-3738",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3738"
    },
    {
      "cve": "CVE-2021-3770",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3770"
    },
    {
      "cve": "CVE-2021-3778",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3778"
    },
    {
      "cve": "CVE-2021-3796",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3796"
    },
    {
      "cve": "CVE-2021-38115",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-38115"
    },
    {
      "cve": "CVE-2021-3872",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3872"
    },
    {
      "cve": "CVE-2021-3875",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3875"
    },
    {
      "cve": "CVE-2021-3903",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3903"
    },
    {
      "cve": "CVE-2021-39212",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39212"
    },
    {
      "cve": "CVE-2021-39272",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39272"
    },
    {
      "cve": "CVE-2021-3928",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3928"
    },
    {
      "cve": "CVE-2021-3968",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3968"
    },
    {
      "cve": "CVE-2021-3973",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3973"
    },
    {
      "cve": "CVE-2021-3974",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3974"
    },
    {
      "cve": "CVE-2021-3984",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3984"
    },
    {
      "cve": "CVE-2021-39920",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39920"
    },
    {
      "cve": "CVE-2021-39921",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39921"
    },
    {
      "cve": "CVE-2021-39922",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39922"
    },
    {
      "cve": "CVE-2021-39923",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39923"
    },
    {
      "cve": "CVE-2021-39924",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39924"
    },
    {
      "cve": "CVE-2021-39925",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39925"
    },
    {
      "cve": "CVE-2021-39926",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39926"
    },
    {
      "cve": "CVE-2021-39928",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39928"
    },
    {
      "cve": "CVE-2021-39929",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39929"
    },
    {
      "cve": "CVE-2021-4008",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4008"
    },
    {
      "cve": "CVE-2021-4009",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4009"
    },
    {
      "cve": "CVE-2021-4010",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4010"
    },
    {
      "cve": "CVE-2021-4011",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4011"
    },
    {
      "cve": "CVE-2021-40145",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-40145"
    },
    {
      "cve": "CVE-2021-4019",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4019"
    },
    {
      "cve": "CVE-2021-4034",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4034"
    },
    {
      "cve": "CVE-2021-4069",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4069"
    },
    {
      "cve": "CVE-2021-40812",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-40812"
    },
    {
      "cve": "CVE-2021-41133",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-41133"
    },
    {
      "cve": "CVE-2021-4140",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4140"
    },
    {
      "cve": "CVE-2021-41495",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-41495"
    },
    {
      "cve": "CVE-2021-41496",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-41496"
    },
    {
      "cve": "CVE-2021-4160",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4160"
    },
    {
      "cve": "CVE-2021-4181",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4181"
    },
    {
      "cve": "CVE-2021-41817",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-41817"
    },
    {
      "cve": "CVE-2021-41819",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-41819"
    },
    {
      "cve": "CVE-2021-4182",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4182"
    },
    {
      "cve": "CVE-2021-4183",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4183"
    },
    {
      "cve": "CVE-2021-4184",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4184"
    },
    {
      "cve": "CVE-2021-4185",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4185"
    },
    {
      "cve": "CVE-2021-42717",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-42717"
    },
    {
      "cve": "CVE-2021-42762",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-42762"
    },
    {
      "cve": "CVE-2021-43331",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43331"
    },
    {
      "cve": "CVE-2021-43332",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43332"
    },
    {
      "cve": "CVE-2021-43395",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43395"
    },
    {
      "cve": "CVE-2021-43527",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43527"
    },
    {
      "cve": "CVE-2021-43528",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43528"
    },
    {
      "cve": "CVE-2021-43536",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43536"
    },
    {
      "cve": "CVE-2021-43537",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43537"
    },
    {
      "cve": "CVE-2021-43538",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43538"
    },
    {
      "cve": "CVE-2021-43539",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43539"
    },
    {
      "cve": "CVE-2021-43541",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43541"
    },
    {
      "cve": "CVE-2021-43542",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43542"
    },
    {
      "cve": "CVE-2021-43543",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43543"
    },
    {
      "cve": "CVE-2021-43545",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43545"
    },
    {
      "cve": "CVE-2021-43546",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43546"
    },
    {
      "cve": "CVE-2021-43566",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43566"
    },
    {
      "cve": "CVE-2021-43818",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43818"
    },
    {
      "cve": "CVE-2021-44142",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44142"
    },
    {
      "cve": "CVE-2021-44224",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44224"
    },
    {
      "cve": "CVE-2021-44227",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44227"
    },
    {
      "cve": "CVE-2021-44420",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44420"
    },
    {
      "cve": "CVE-2021-44531",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44531"
    },
    {
      "cve": "CVE-2021-44532",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44532"
    },
    {
      "cve": "CVE-2021-44533",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44533"
    },
    {
      "cve": "CVE-2021-44540",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44540"
    },
    {
      "cve": "CVE-2021-44541",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44541"
    },
    {
      "cve": "CVE-2021-44542",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44542"
    },
    {
      "cve": "CVE-2021-44543",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44543"
    },
    {
      "cve": "CVE-2021-44790",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44790"
    },
    {
      "cve": "CVE-2021-45078",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-45078"
    },
    {
      "cve": "CVE-2021-45115",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-45115"
    },
    {
      "cve": "CVE-2021-45116",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-45116"
    },
    {
      "cve": "CVE-2021-45452",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-45452"
    },
    {
      "cve": "CVE-2021-45960",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-45960"
    },
    {
      "cve": "CVE-2021-46143",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-46143"
    },
    {
      "cve": "CVE-2022-0336",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0336"
    },
    {
      "cve": "CVE-2022-0391",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0391"
    },
    {
      "cve": "CVE-2022-0566",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0566"
    },
    {
      "cve": "CVE-2022-0581",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0581"
    },
    {
      "cve": "CVE-2022-0582",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0582"
    },
    {
      "cve": "CVE-2022-0583",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0583"
    },
    {
      "cve": "CVE-2022-0585",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0585"
    },
    {
      "cve": "CVE-2022-0586",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0586"
    },
    {
      "cve": "CVE-2022-0778",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0778"
    },
    {
      "cve": "CVE-2022-21248",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21248"
    },
    {
      "cve": "CVE-2022-21263",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21263"
    },
    {
      "cve": "CVE-2022-21271",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21271"
    },
    {
      "cve": "CVE-2022-21282",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21282"
    },
    {
      "cve": "CVE-2022-21291",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21291"
    },
    {
      "cve": "CVE-2022-21293",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21293"
    },
    {
      "cve": "CVE-2022-21294",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21294"
    },
    {
      "cve": "CVE-2022-21296",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21296"
    },
    {
      "cve": "CVE-2022-21298",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21298"
    },
    {
      "cve": "CVE-2022-21299",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21299"
    },
    {
      "cve": "CVE-2022-21305",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21305"
    },
    {
      "cve": "CVE-2022-21340",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21340"
    },
    {
      "cve": "CVE-2022-21341",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21341"
    },
    {
      "cve": "CVE-2022-21349",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21349"
    },
    {
      "cve": "CVE-2022-21360",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21360"
    },
    {
      "cve": "CVE-2022-21365",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21365"
    },
    {
      "cve": "CVE-2022-21375",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21375"
    },
    {
      "cve": "CVE-2022-21384",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21384"
    },
    {
      "cve": "CVE-2022-21416",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21416"
    },
    {
      "cve": "CVE-2022-21446",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21446"
    },
    {
      "cve": "CVE-2022-21461",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21461"
    },
    {
      "cve": "CVE-2022-21463",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21463"
    },
    {
      "cve": "CVE-2022-21493",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21493"
    },
    {
      "cve": "CVE-2022-21494",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21494"
    },
    {
      "cve": "CVE-2022-21712",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21712"
    },
    {
      "cve": "CVE-2022-21716",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21716"
    },
    {
      "cve": "CVE-2022-21824",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21824"
    },
    {
      "cve": "CVE-2022-22719",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22719"
    },
    {
      "cve": "CVE-2022-22720",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22720"
    },
    {
      "cve": "CVE-2022-22721",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22721"
    },
    {
      "cve": "CVE-2022-22737",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22737"
    },
    {
      "cve": "CVE-2022-22738",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22738"
    },
    {
      "cve": "CVE-2022-22739",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22739"
    },
    {
      "cve": "CVE-2022-22740",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22740"
    },
    {
      "cve": "CVE-2022-22741",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22741"
    },
    {
      "cve": "CVE-2022-22742",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22742"
    },
    {
      "cve": "CVE-2022-22743",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22743"
    },
    {
      "cve": "CVE-2022-22744",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22744"
    },
    {
      "cve": "CVE-2022-22745",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22745"
    },
    {
      "cve": "CVE-2022-22746",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22746"
    },
    {
      "cve": "CVE-2022-22747",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22747"
    },
    {
      "cve": "CVE-2022-22748",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22748"
    },
    {
      "cve": "CVE-2022-22751",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22751"
    },
    {
      "cve": "CVE-2022-22753",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22753"
    },
    {
      "cve": "CVE-2022-22754",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22754"
    },
    {
      "cve": "CVE-2022-22756",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22756"
    },
    {
      "cve": "CVE-2022-22759",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22759"
    },
    {
      "cve": "CVE-2022-22760",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22760"
    },
    {
      "cve": "CVE-2022-22761",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22761"
    },
    {
      "cve": "CVE-2022-22763",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22763"
    },
    {
      "cve": "CVE-2022-22764",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22764"
    },
    {
      "cve": "CVE-2022-22815",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22815"
    },
    {
      "cve": "CVE-2022-22816",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22816"
    },
    {
      "cve": "CVE-2022-22817",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22817"
    },
    {
      "cve": "CVE-2022-22818",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22818"
    },
    {
      "cve": "CVE-2022-22822",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22822"
    },
    {
      "cve": "CVE-2022-22823",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22823"
    },
    {
      "cve": "CVE-2022-22824",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22824"
    },
    {
      "cve": "CVE-2022-22825",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22825"
    },
    {
      "cve": "CVE-2022-22826",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22826"
    },
    {
      "cve": "CVE-2022-22827",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22827"
    },
    {
      "cve": "CVE-2022-23181",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-23181"
    },
    {
      "cve": "CVE-2022-23833",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-23833"
    },
    {
      "cve": "CVE-2022-23852",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-23852"
    },
    {
      "cve": "CVE-2022-23943",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-23943"
    },
    {
      "cve": "CVE-2022-23990",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-23990"
    },
    {
      "cve": "CVE-2022-24407",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-24407"
    },
    {
      "cve": "CVE-2022-25235",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-25235"
    },
    {
      "cve": "CVE-2022-25236",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-25236"
    },
    {
      "cve": "CVE-2022-25313",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-25313"
    },
    {
      "cve": "CVE-2022-25314",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-25314"
    },
    {
      "cve": "CVE-2022-25315",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-25315"
    },
    {
      "cve": "CVE-2022-26381",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-26381"
    },
    {
      "cve": "CVE-2022-26383",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-26383"
    },
    {
      "cve": "CVE-2022-26384",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-26384"
    },
    {
      "cve": "CVE-2022-26386",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-26386"
    },
    {
      "cve": "CVE-2022-26387",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-26387"
    },
    {
      "cve": "CVE-2022-26485",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-26485"
    },
    {
      "cve": "CVE-2022-26486",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-26486"
    }
  ]
}
  WID-SEC-W-2023-0426
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "IBM Spectrum Protect ist eine zentralisierte Backupl\u00f6sung f\u00fcr Systeme im Netzwerk.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, sensible Informationen offenzulegen und seine Privilegien zu erweitern.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- Sonstiges\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-0426 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0426.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-0426 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0426"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory vom 2022-03-13",
        "url": "https://www.ibm.com/support/pages/node/6562989"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory vom 2022-03-13",
        "url": "https://www.ibm.com/support/pages/node/6562383"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory vom 2022-03-13",
        "url": "https://www.ibm.com/support/pages/node/6562855"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory vom 2022-03-13",
        "url": "https://www.ibm.com/support/pages/node/6562401"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory vom 2022-03-13",
        "url": "https://www.ibm.com/support/pages/node/6562919"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory vom 2022-03-13",
        "url": "https://www.ibm.com/support/pages/node/6562873"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory vom 2022-03-13",
        "url": "https://www.ibm.com/support/pages/node/6562843"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory vom 2022-03-13",
        "url": "https://www.ibm.com/support/pages/node/6562405"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 6956658 vom 2023-02-18",
        "url": "https://www.ibm.com/support/pages/node/6956658"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7180361 vom 2025-01-07",
        "url": "https://www.ibm.com/support/pages/node/7180361"
      }
    ],
    "source_lang": "en-US",
    "title": "IBM Spectrum Protect: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-01-06T23:00:00.000+00:00",
      "generator": {
        "date": "2025-01-07T11:48:17.558+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.10"
        }
      },
      "id": "WID-SEC-W-2023-0426",
      "initial_release_date": "2022-03-13T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-03-13T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2023-02-19T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-01-06T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von IBM aufgenommen"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "7.6.1.2",
                "product": {
                  "name": "IBM Maximo Asset Management 7.6.1.2",
                  "product_id": "T026420",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:maximo_asset_management:7.6.1.2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "7.6.1.3",
                "product": {
                  "name": "IBM Maximo Asset Management 7.6.1.3",
                  "product_id": "T026421",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:maximo_asset_management:7.6.1.3"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Maximo Asset Management"
          },
          {
            "category": "product_name",
            "name": "IBM Spectrum Protect",
            "product": {
              "name": "IBM Spectrum Protect",
              "product_id": "T013661",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:spectrum_protect:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c10.1.6.4",
                "product": {
                  "name": "IBM Spectrum Protect Plus \u003c10.1.6.4",
                  "product_id": "T040030"
                }
              },
              {
                "category": "product_version",
                "name": "10.1.6.4",
                "product": {
                  "name": "IBM Spectrum Protect Plus 10.1.6.4",
                  "product_id": "T040030-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Spectrum Protect Plus"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-20373",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-20373"
    },
    {
      "cve": "CVE-2021-23222",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-23222"
    },
    {
      "cve": "CVE-2021-23727",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-23727"
    },
    {
      "cve": "CVE-2021-29678",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-29678"
    },
    {
      "cve": "CVE-2021-33026",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-33026"
    },
    {
      "cve": "CVE-2021-35517",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-35517"
    },
    {
      "cve": "CVE-2021-35578",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-35578"
    },
    {
      "cve": "CVE-2021-36090",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-36090"
    },
    {
      "cve": "CVE-2021-38926",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-38926"
    },
    {
      "cve": "CVE-2021-38931",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-38931"
    },
    {
      "cve": "CVE-2021-39002",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-39002"
    },
    {
      "cve": "CVE-2021-4034",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-4034"
    },
    {
      "cve": "CVE-2021-41617",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-41617"
    },
    {
      "cve": "CVE-2021-44716",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-44716"
    },
    {
      "cve": "CVE-2021-44717",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-44717"
    },
    {
      "cve": "CVE-2022-0235",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-0235"
    },
    {
      "cve": "CVE-2022-0391",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-0391"
    },
    {
      "cve": "CVE-2022-21680",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-21680"
    },
    {
      "cve": "CVE-2022-21681",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-21681"
    },
    {
      "cve": "CVE-2022-22346",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-22346"
    },
    {
      "cve": "CVE-2022-22348",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-22348"
    },
    {
      "cve": "CVE-2022-22354",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-22354"
    },
    {
      "cve": "CVE-2022-23772",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-23772"
    },
    {
      "cve": "CVE-2022-23773",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-23773"
    },
    {
      "cve": "CVE-2022-23806",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-23806"
    }
  ]
}
  WID-SEC-W-2022-1483
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "PolicyKit ist ein Berechtigungsdienst, der die Kommunikation zwischen Benutzersoftware und Systemkomponenten erlaubt, wenn die Benutzersoftware dazu berechtigt ist.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann eine Schwachstelle in PolicyKit ausnutzen, um seine Privilegien zu erh\u00f6hen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- UNIX\n- Linux",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-1483 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1483.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-1483 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1483"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0265 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0265"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0266 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0266"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0267 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0267"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0268 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0268"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0269 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0269"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0270 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0270"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0271 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0271"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0272 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0272"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0273 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0273"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0274 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0274"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-0274 vom 2022-01-25",
        "url": "http://linux.oracle.com/errata/ELSA-2022-0274.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory vom 2022-01-25",
        "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00026.html"
      },
      {
        "category": "external",
        "summary": "SUSE Linux Security Update vom 2022-01-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010074.html"
      },
      {
        "category": "external",
        "summary": "SUSE Linux Security Update vom 2022-01-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010075.html"
      },
      {
        "category": "external",
        "summary": "SUSE Linux Security Update vom 2022-01-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010076.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5252-1 vom 2022-01-25",
        "url": "https://ubuntu.com/security/notices/USN-5252-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5252-1 vom 2022-01-25",
        "url": "https://ubuntu.com/security/notices/USN-5252-2"
      },
      {
        "category": "external",
        "summary": "Exploit",
        "url": "https://www.bleepingcomputer.com/news/security/linux-system-service-bug-gives-root-on-all-major-distros-exploit-released/"
      },
      {
        "category": "external",
        "summary": "Qualys Advisory CVE-2021-4034 vom 2022-01-25",
        "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2022:0274 vom 2022-01-26",
        "url": "https://lists.centos.org/pipermail/centos-announce/2022-January/073552.html"
      },
      {
        "category": "external",
        "summary": "Gentoo Linux Security Advisory GLSA-202201-01 vom 2022-01-27",
        "url": "https://security.gentoo.org/glsa/202201-01"
      },
      {
        "category": "external",
        "summary": "IGEL Security Notice ISN-2022-01 vom 2022-01-27",
        "url": "https://kb.igel.com/securitysafety/en/isn-2022-01-polkit-escalation-of-privilege-54093876.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-1745 vom 2022-01-27",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1745.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-016 vom 2022-01-27",
        "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-016.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-9073 vom 2022-01-28",
        "url": "http://linux.oracle.com/errata/ELSA-2022-9073.html"
      },
      {
        "category": "external",
        "summary": "Aruba Product Security Advisory",
        "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-003.txt"
      },
      {
        "category": "external",
        "summary": "Extreme Networks Security Advisory",
        "url": "https://extremeportal.force.com/ExtrArticleDetail?an=000102362"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2022-010 vom 2021-01-31",
        "url": "https://downloads.avaya.com/css/P8/documents/101080366"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2022-007 vom 2021-01-31",
        "url": "https://downloads.avaya.com/css/P8/documents/101080315"
      },
      {
        "category": "external",
        "summary": "Unify Security Advisory Report",
        "url": "https://networks.unify.com/security/advisories/OBSO-2202-01.pdf"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0443 vom 2022-02-08",
        "url": "https://access.redhat.com/errata/RHSA-2022:0443"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0540 vom 2022-02-15",
        "url": "https://access.redhat.com/errata/RHSA-2022:0540"
      },
      {
        "category": "external",
        "summary": "ORACLE OVMSA-2022-0006 vom 2022-02-17",
        "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2022-February/001046.html"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739\u0026elq_cid=62517953\u0026docId=hpesbnw04237en_us"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739\u0026elq_cid=67018031\u0026docId=hpesbnw04237en_us"
      },
      {
        "category": "external",
        "summary": "Arch Linux Security Advisory ASA-202204-2 vom 2022-04-05",
        "url": "https://security.archlinux.org/ASA-202204-2"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 6621599 vom 2022-09-21",
        "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-maximo-asset-management-is-vulnerable-to-authentication-bypass-cve-2022-40616/"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-9999 vom 2022-11-16",
        "url": "http://linux.oracle.com/errata/ELSA-2022-9999.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-220 vom 2022-12-09",
        "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-220.html"
      },
      {
        "category": "external",
        "summary": "ExtremeNetworks Vulnerability Notice SA-2022-001 vom 2024-01-09",
        "url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000102362"
      }
    ],
    "source_lang": "en-US",
    "title": "PolicyKit: Schwachstelle erm\u00f6glicht Privilegieneskalation",
    "tracking": {
      "current_release_date": "2024-01-08T23:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:35:29.086+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2022-1483",
      "initial_release_date": "2022-01-25T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2022-01-26T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von CentOS aufgenommen"
        },
        {
          "date": "2022-01-27T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Gentoo, IGEL und Amazon aufgenommen"
        },
        {
          "date": "2022-01-30T23:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2022-02-01T23:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Aruba aufgenommen"
        },
        {
          "date": "2022-02-02T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Unify, ExtremeNetworks und AVAYA aufgenommen"
        },
        {
          "date": "2022-02-07T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-02-15T23:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-02-16T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von ORACLE aufgenommen"
        },
        {
          "date": "2022-02-24T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von HP aufgenommen"
        },
        {
          "date": "2022-03-03T23:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2022-04-04T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Arch Linux aufgenommen"
        },
        {
          "date": "2022-09-20T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2022-11-16T23:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2022-12-11T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-01-08T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von ExtremeNetworks aufgenommen"
        }
      ],
      "status": "final",
      "version": "16"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Aruba ArubaOS",
            "product": {
              "name": "Aruba ArubaOS",
              "product_id": "T021926",
              "product_identification_helper": {
                "cpe": "cpe:/o:arubanetworks:arubaos:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Aruba ClearPass",
            "product": {
              "name": "Aruba ClearPass",
              "product_id": "T022183",
              "product_identification_helper": {
                "cpe": "cpe:/a:arubanetworks:clearpass:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Aruba ClearPass Policy Manager",
            "product": {
              "name": "Aruba ClearPass Policy Manager",
              "product_id": "274506",
              "product_identification_helper": {
                "cpe": "cpe:/a:arubanetworks:clearpass_policy_manager:6.3.0.60730"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Aruba Switch",
            "product": {
              "name": "Aruba Switch",
              "product_id": "T016786",
              "product_identification_helper": {
                "cpe": "cpe:/h:arubanetworks:switch:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Aruba"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Avaya Aura Application Enablement Services",
            "product": {
              "name": "Avaya Aura Application Enablement Services",
              "product_id": "T015516",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_application_enablement_services:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura Communication Manager",
            "product": {
              "name": "Avaya Aura Communication Manager",
              "product_id": "T015126",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:communication_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura Experience Portal",
            "product": {
              "name": "Avaya Aura Experience Portal",
              "product_id": "T015519",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_experience_portal:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura Session Manager",
            "product": {
              "name": "Avaya Aura Session Manager",
              "product_id": "T015127",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:session_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura System Manager",
            "product": {
              "name": "Avaya Aura System Manager",
              "product_id": "T015518",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_system_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Web License Manager",
            "product": {
              "name": "Avaya Web License Manager",
              "product_id": "T016243",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:web_license_manager:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Avaya"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Debian Linux",
                "product": {
                  "name": "Debian Linux",
                  "product_id": "2951",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:debian:debian_linux:-"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Debian Linux 9",
                "product": {
                  "name": "Debian Linux 9",
                  "product_id": "T021835",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:debian:debian_linux:9"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Linux"
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Extreme Networks Extreme Management Center",
            "product": {
              "name": "Extreme Networks Extreme Management Center",
              "product_id": "T020453",
              "product_identification_helper": {
                "cpe": "cpe:/a:extremenetworks:netsight:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Extreme Networks HiveManager Classic On-Premises \u003c XIQ",
            "product": {
              "name": "Extreme Networks HiveManager Classic On-Premises \u003c XIQ",
              "product_id": "T031896",
              "product_identification_helper": {
                "cpe": "cpe:/a:extremenetworks:hivemanager:xiq::classic_on-premises"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Extreme Networks"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "IBM Maximo Asset Management",
            "product": {
              "name": "IBM Maximo Asset Management",
              "product_id": "T024664",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:maximo_asset_management:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "IGEL OS",
            "product": {
              "name": "IGEL OS",
              "product_id": "T017865",
              "product_identification_helper": {
                "cpe": "cpe:/o:igel:os:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "IGEL"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source Arch Linux",
            "product": {
              "name": "Open Source Arch Linux",
              "product_id": "T013312",
              "product_identification_helper": {
                "cpe": "cpe:/o:archlinux:archlinux:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Open Source CentOS",
            "product": {
              "name": "Open Source CentOS",
              "product_id": "1727",
              "product_identification_helper": {
                "cpe": "cpe:/o:centos:centos:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Open Source PolicyKit",
            "product": {
              "name": "Open Source PolicyKit",
              "product_id": "T005505",
              "product_identification_helper": {
                "cpe": "cpe:/a:policykit:policykit:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Oracle Linux 7",
                "product": {
                  "name": "Oracle Linux 7",
                  "product_id": "287065",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:oracle:linux:7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Oracle Linux",
                "product": {
                  "name": "Oracle Linux",
                  "product_id": "T004914",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:oracle:linux:-"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Linux"
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7",
                "product": {
                  "name": "Red Hat Enterprise Linux 7",
                  "product_id": "T007578",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 8.4 Extended Update Support",
                "product": {
                  "name": "Red Hat Enterprise Linux 8.4 Extended Update Support",
                  "product_id": "T021022",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8.4_extended_update_support"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 8.2 Extended Update Support.",
                "product": {
                  "name": "Red Hat Enterprise Linux 8.2 Extended Update Support.",
                  "product_id": "T021823",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8.2_extended_update_support."
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions",
                "product": {
                  "name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions",
                  "product_id": "T021824",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8.1_update_services_for_sap_solutions"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 6 Extended Lifecycle Support",
                "product": {
                  "name": "Red Hat Enterprise Linux 6 Extended Lifecycle Support",
                  "product_id": "T021825",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6_extended_lifecycle_support"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7.3 Advanced Update Support",
                "product": {
                  "name": "Red Hat Enterprise Linux 7.3 Advanced Update Support",
                  "product_id": "T021826",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7.3_advanced_update_support"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7.6 Advanced Update Support",
                "product": {
                  "name": "Red Hat Enterprise Linux 7.6 Advanced Update Support",
                  "product_id": "T021827",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7.6_advanced_update_support"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7.6 Telco Extended Update Support",
                "product": {
                  "name": "Red Hat Enterprise Linux 7.6 Telco Extended Update Support",
                  "product_id": "T021828",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7.6_telco_extended_update_support"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions",
                "product": {
                  "name": "Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions",
                  "product_id": "T021829",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7.6_update_services_for_sap_solutions"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7.4 Advanced Update Support",
                "product": {
                  "name": "Red Hat Enterprise Linux 7.4 Advanced Update Support",
                  "product_id": "T021830",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7.4_advanced_update_support"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7.7 Advanced Update Support",
                "product": {
                  "name": "Red Hat Enterprise Linux 7.7 Advanced Update Support",
                  "product_id": "T021831",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7.7_advanced_update_support"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7.7 Telco Extended Update Support",
                "product": {
                  "name": "Red Hat Enterprise Linux 7.7 Telco Extended Update Support",
                  "product_id": "T021832",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7.7_telco_extended_update_support"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions",
                "product": {
                  "name": "Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions",
                  "product_id": "T021833",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7.7_update_services_for_sap_solutions"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12",
                  "product_id": "T021836",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_linux:enterprise_server_12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP 12",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP 12",
                  "product_id": "T021837",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_linux:enterprise_server_for_sap_12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12",
                  "product_id": "T021838",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_linux:enterprise_software_development_kit_12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 12",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 12",
                  "product_id": "T021839",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_linux:enterprise_workstation_extension_12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15",
                  "product_id": "T021840",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_linux:enterprise_server_15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP 15",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP 15",
                  "product_id": "T021842",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_linux:enterprise_server_for_sap_15"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Linux"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Manager Server 4.1",
                "product": {
                  "name": "SUSE Manager Server 4.1",
                  "product_id": "T021843",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:suse:manager:server_4.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Retail Branch Server 4.1",
                "product": {
                  "name": "SUSE Manager Retail Branch Server 4.1",
                  "product_id": "T021844",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:suse:manager:retail_branch_server_4.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Proxy 4.1",
                "product": {
                  "name": "SUSE Manager Proxy 4.1",
                  "product_id": "T021845",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:suse:manager:proxy_4.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Manager"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu Linux 18.04",
                "product": {
                  "name": "Ubuntu Linux 18.04",
                  "product_id": "353835",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:canonical:ubuntu_linux:18.04"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Ubuntu Linux 20.04",
                "product": {
                  "name": "Ubuntu Linux 20.04",
                  "product_id": "T019179",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:canonical:ubuntu_linux:20.04"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Ubuntu Linux 14.04 ESM",
                "product": {
                  "name": "Ubuntu Linux 14.04 ESM",
                  "product_id": "T021846",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:canonical:ubuntu_linux:14.04_esm"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Ubuntu Linux 16.04 ESM",
                "product": {
                  "name": "Ubuntu Linux 16.04 ESM",
                  "product_id": "T021847",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:canonical:ubuntu_linux:16.04_esm"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Ubuntu Linux 21.10",
                "product": {
                  "name": "Ubuntu Linux 21.10",
                  "product_id": "T021848",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:canonical:ubuntu_linux:21.10"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Linux"
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Unify OpenScape Voice",
            "product": {
              "name": "Unify OpenScape Voice",
              "product_id": "T008873",
              "product_identification_helper": {
                "cpe": "cpe:/a:unify:openscape_voice:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Unify OpenScape Xpert Clients",
            "product": {
              "name": "Unify OpenScape Xpert Clients",
              "product_id": "T021945",
              "product_identification_helper": {
                "cpe": "cpe:/h:unify:openscape_xpert:::client"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Unify"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-4034",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in PolicyKit (polkit) im \"pkexec\" Dienstprogramm aufgrund eines Out-of-bound write und eines Out-of-bounds read. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien auf \"root\" zu erweitern."
        }
      ],
      "product_status": {
        "known_affected": [
          "T008873",
          "T031896",
          "T015127",
          "T021926",
          "T015126",
          "T021848",
          "T021847",
          "T004914",
          "T019179",
          "398363",
          "T022183",
          "287065",
          "T007578",
          "T015519",
          "T015518",
          "T015516",
          "T012167",
          "T016243",
          "T020453",
          "2951",
          "T021824",
          "T021945",
          "T021823",
          "T021022",
          "T005505",
          "T021828",
          "T021827",
          "T021826",
          "T021825",
          "T021829",
          "T021831",
          "T021830",
          "T021835",
          "T021833",
          "T021832",
          "T024664",
          "353835",
          "T013312",
          "T021839",
          "T021838",
          "T021837",
          "T016786",
          "T021836",
          "T021842",
          "T021840",
          "T021846",
          "T017865",
          "T021845",
          "T021844",
          "T021843",
          "1727",
          "274506"
        ]
      },
      "release_date": "2022-01-25T23:00:00.000+00:00",
      "title": "CVE-2021-4034"
    }
  ]
}
  wid-sec-w-2022-0432
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-0432 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0432.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-0432 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0432"
      },
      {
        "category": "external",
        "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04",
        "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf"
      },
      {
        "category": "external",
        "summary": "Xerox Mini Bulletin XRX21A vom 2022-06-21",
        "url": "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-014-FreeFlow-Print-Server-v9.pdf"
      }
    ],
    "source_lang": "en-US",
    "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2023-04-03T22:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:29:02.928+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2022-0432",
      "initial_release_date": "2022-06-21T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-06-21T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2023-04-03T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von XEROX aufgenommen"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Xerox FreeFlow Print Server 9",
                "product": {
                  "name": "Xerox FreeFlow Print Server 9",
                  "product_id": "T002977",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:xerox:freeflow_print_server:9"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Xerox FreeFlow Print Server v9",
                "product": {
                  "name": "Xerox FreeFlow Print Server v9",
                  "product_id": "T015632",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:xerox:freeflow_print_server:v9"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "FreeFlow Print Server"
          }
        ],
        "category": "vendor",
        "name": "Xerox"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-2124",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2016-2124"
    },
    {
      "cve": "CVE-2019-14822",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2019-14822"
    },
    {
      "cve": "CVE-2019-19906",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2019-19906"
    },
    {
      "cve": "CVE-2020-15250",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2020-15250"
    },
    {
      "cve": "CVE-2020-17049",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2020-17049"
    },
    {
      "cve": "CVE-2020-25717",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2020-25717"
    },
    {
      "cve": "CVE-2020-25718",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2020-25718"
    },
    {
      "cve": "CVE-2020-25719",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2020-25719"
    },
    {
      "cve": "CVE-2020-25721",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2020-25721"
    },
    {
      "cve": "CVE-2020-25722",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2020-25722"
    },
    {
      "cve": "CVE-2020-9484",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2020-9484"
    },
    {
      "cve": "CVE-2021-21707",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-21707"
    },
    {
      "cve": "CVE-2021-22926",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-22926"
    },
    {
      "cve": "CVE-2021-23192",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-23192"
    },
    {
      "cve": "CVE-2021-27815",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-27815"
    },
    {
      "cve": "CVE-2021-30846",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-30846"
    },
    {
      "cve": "CVE-2021-30848",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-30848"
    },
    {
      "cve": "CVE-2021-30849",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-30849"
    },
    {
      "cve": "CVE-2021-30851",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-30851"
    },
    {
      "cve": "CVE-2021-30858",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-30858"
    },
    {
      "cve": "CVE-2021-33430",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-33430"
    },
    {
      "cve": "CVE-2021-34141",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-34141"
    },
    {
      "cve": "CVE-2021-35604",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-35604"
    },
    {
      "cve": "CVE-2021-35624",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-35624"
    },
    {
      "cve": "CVE-2021-3572",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3572"
    },
    {
      "cve": "CVE-2021-3711",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3711"
    },
    {
      "cve": "CVE-2021-3733",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3733"
    },
    {
      "cve": "CVE-2021-3737",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3737"
    },
    {
      "cve": "CVE-2021-3738",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3738"
    },
    {
      "cve": "CVE-2021-3770",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3770"
    },
    {
      "cve": "CVE-2021-3778",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3778"
    },
    {
      "cve": "CVE-2021-3796",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3796"
    },
    {
      "cve": "CVE-2021-38115",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-38115"
    },
    {
      "cve": "CVE-2021-3872",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3872"
    },
    {
      "cve": "CVE-2021-3875",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3875"
    },
    {
      "cve": "CVE-2021-3903",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3903"
    },
    {
      "cve": "CVE-2021-39212",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39212"
    },
    {
      "cve": "CVE-2021-39272",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39272"
    },
    {
      "cve": "CVE-2021-3928",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3928"
    },
    {
      "cve": "CVE-2021-3968",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3968"
    },
    {
      "cve": "CVE-2021-3973",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3973"
    },
    {
      "cve": "CVE-2021-3974",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3974"
    },
    {
      "cve": "CVE-2021-3984",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3984"
    },
    {
      "cve": "CVE-2021-39920",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39920"
    },
    {
      "cve": "CVE-2021-39921",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39921"
    },
    {
      "cve": "CVE-2021-39922",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39922"
    },
    {
      "cve": "CVE-2021-39923",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39923"
    },
    {
      "cve": "CVE-2021-39924",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39924"
    },
    {
      "cve": "CVE-2021-39925",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39925"
    },
    {
      "cve": "CVE-2021-39926",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39926"
    },
    {
      "cve": "CVE-2021-39928",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39928"
    },
    {
      "cve": "CVE-2021-39929",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39929"
    },
    {
      "cve": "CVE-2021-4008",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4008"
    },
    {
      "cve": "CVE-2021-4009",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4009"
    },
    {
      "cve": "CVE-2021-4010",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4010"
    },
    {
      "cve": "CVE-2021-4011",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4011"
    },
    {
      "cve": "CVE-2021-40145",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-40145"
    },
    {
      "cve": "CVE-2021-4019",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4019"
    },
    {
      "cve": "CVE-2021-4034",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4034"
    },
    {
      "cve": "CVE-2021-4069",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4069"
    },
    {
      "cve": "CVE-2021-40812",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-40812"
    },
    {
      "cve": "CVE-2021-41133",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-41133"
    },
    {
      "cve": "CVE-2021-4140",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4140"
    },
    {
      "cve": "CVE-2021-41495",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-41495"
    },
    {
      "cve": "CVE-2021-41496",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-41496"
    },
    {
      "cve": "CVE-2021-4181",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4181"
    },
    {
      "cve": "CVE-2021-41817",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-41817"
    },
    {
      "cve": "CVE-2021-41819",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-41819"
    },
    {
      "cve": "CVE-2021-4182",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4182"
    },
    {
      "cve": "CVE-2021-4183",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4183"
    },
    {
      "cve": "CVE-2021-4184",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4184"
    },
    {
      "cve": "CVE-2021-4185",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4185"
    },
    {
      "cve": "CVE-2021-42717",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-42717"
    },
    {
      "cve": "CVE-2021-42762",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-42762"
    },
    {
      "cve": "CVE-2021-43331",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43331"
    },
    {
      "cve": "CVE-2021-43332",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43332"
    },
    {
      "cve": "CVE-2021-43395",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43395"
    },
    {
      "cve": "CVE-2021-43527",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43527"
    },
    {
      "cve": "CVE-2021-43528",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43528"
    },
    {
      "cve": "CVE-2021-43536",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43536"
    },
    {
      "cve": "CVE-2021-43537",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43537"
    },
    {
      "cve": "CVE-2021-43538",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43538"
    },
    {
      "cve": "CVE-2021-43539",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43539"
    },
    {
      "cve": "CVE-2021-43541",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43541"
    },
    {
      "cve": "CVE-2021-43542",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43542"
    },
    {
      "cve": "CVE-2021-43543",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43543"
    },
    {
      "cve": "CVE-2021-43545",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43545"
    },
    {
      "cve": "CVE-2021-43546",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43546"
    },
    {
      "cve": "CVE-2021-43566",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43566"
    },
    {
      "cve": "CVE-2021-43818",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43818"
    },
    {
      "cve": "CVE-2021-44142",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44142"
    },
    {
      "cve": "CVE-2021-44224",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44224"
    },
    {
      "cve": "CVE-2021-44227",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44227"
    },
    {
      "cve": "CVE-2021-44420",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44420"
    },
    {
      "cve": "CVE-2021-44531",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44531"
    },
    {
      "cve": "CVE-2021-44532",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44532"
    },
    {
      "cve": "CVE-2021-44533",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44533"
    },
    {
      "cve": "CVE-2021-44540",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44540"
    },
    {
      "cve": "CVE-2021-44541",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44541"
    },
    {
      "cve": "CVE-2021-44542",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44542"
    },
    {
      "cve": "CVE-2021-44543",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44543"
    },
    {
      "cve": "CVE-2021-44790",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44790"
    },
    {
      "cve": "CVE-2021-45078",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-45078"
    },
    {
      "cve": "CVE-2021-45115",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-45115"
    },
    {
      "cve": "CVE-2021-45116",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-45116"
    },
    {
      "cve": "CVE-2021-45452",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-45452"
    },
    {
      "cve": "CVE-2021-45960",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-45960"
    },
    {
      "cve": "CVE-2021-46143",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-46143"
    },
    {
      "cve": "CVE-2022-0336",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0336"
    },
    {
      "cve": "CVE-2022-0391",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0391"
    },
    {
      "cve": "CVE-2022-0566",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0566"
    },
    {
      "cve": "CVE-2022-0581",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0581"
    },
    {
      "cve": "CVE-2022-0582",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0582"
    },
    {
      "cve": "CVE-2022-0583",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0583"
    },
    {
      "cve": "CVE-2022-0585",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0585"
    },
    {
      "cve": "CVE-2022-0586",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0586"
    },
    {
      "cve": "CVE-2022-0778",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0778"
    },
    {
      "cve": "CVE-2022-21248",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21248"
    },
    {
      "cve": "CVE-2022-21263",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21263"
    },
    {
      "cve": "CVE-2022-21271",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21271"
    },
    {
      "cve": "CVE-2022-21282",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21282"
    },
    {
      "cve": "CVE-2022-21291",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21291"
    },
    {
      "cve": "CVE-2022-21293",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21293"
    },
    {
      "cve": "CVE-2022-21294",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21294"
    },
    {
      "cve": "CVE-2022-21296",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21296"
    },
    {
      "cve": "CVE-2022-21298",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21298"
    },
    {
      "cve": "CVE-2022-21299",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21299"
    },
    {
      "cve": "CVE-2022-21305",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21305"
    },
    {
      "cve": "CVE-2022-21340",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21340"
    },
    {
      "cve": "CVE-2022-21341",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21341"
    },
    {
      "cve": "CVE-2022-21349",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21349"
    },
    {
      "cve": "CVE-2022-21360",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21360"
    },
    {
      "cve": "CVE-2022-21365",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21365"
    },
    {
      "cve": "CVE-2022-21375",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21375"
    },
    {
      "cve": "CVE-2022-21384",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21384"
    },
    {
      "cve": "CVE-2022-21416",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21416"
    },
    {
      "cve": "CVE-2022-21446",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21446"
    },
    {
      "cve": "CVE-2022-21461",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21461"
    },
    {
      "cve": "CVE-2022-21463",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21463"
    },
    {
      "cve": "CVE-2022-21493",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21493"
    },
    {
      "cve": "CVE-2022-21494",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21494"
    },
    {
      "cve": "CVE-2022-21712",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21712"
    },
    {
      "cve": "CVE-2022-21716",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21716"
    },
    {
      "cve": "CVE-2022-21824",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21824"
    },
    {
      "cve": "CVE-2022-22719",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22719"
    },
    {
      "cve": "CVE-2022-22720",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22720"
    },
    {
      "cve": "CVE-2022-22721",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22721"
    },
    {
      "cve": "CVE-2022-22737",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22737"
    },
    {
      "cve": "CVE-2022-22738",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22738"
    },
    {
      "cve": "CVE-2022-22739",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22739"
    },
    {
      "cve": "CVE-2022-22740",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22740"
    },
    {
      "cve": "CVE-2022-22741",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22741"
    },
    {
      "cve": "CVE-2022-22742",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22742"
    },
    {
      "cve": "CVE-2022-22743",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22743"
    },
    {
      "cve": "CVE-2022-22744",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22744"
    },
    {
      "cve": "CVE-2022-22745",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22745"
    },
    {
      "cve": "CVE-2022-22746",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22746"
    },
    {
      "cve": "CVE-2022-22747",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22747"
    },
    {
      "cve": "CVE-2022-22748",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22748"
    },
    {
      "cve": "CVE-2022-22751",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22751"
    },
    {
      "cve": "CVE-2022-22753",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22753"
    },
    {
      "cve": "CVE-2022-22754",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22754"
    },
    {
      "cve": "CVE-2022-22756",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22756"
    },
    {
      "cve": "CVE-2022-22759",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22759"
    },
    {
      "cve": "CVE-2022-22760",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22760"
    },
    {
      "cve": "CVE-2022-22761",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22761"
    },
    {
      "cve": "CVE-2022-22763",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22763"
    },
    {
      "cve": "CVE-2022-22764",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22764"
    },
    {
      "cve": "CVE-2022-22815",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22815"
    },
    {
      "cve": "CVE-2022-22816",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22816"
    },
    {
      "cve": "CVE-2022-22817",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22817"
    },
    {
      "cve": "CVE-2022-22818",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22818"
    },
    {
      "cve": "CVE-2022-22822",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22822"
    },
    {
      "cve": "CVE-2022-22823",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22823"
    },
    {
      "cve": "CVE-2022-22824",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22824"
    },
    {
      "cve": "CVE-2022-22825",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22825"
    },
    {
      "cve": "CVE-2022-22826",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22826"
    },
    {
      "cve": "CVE-2022-22827",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22827"
    },
    {
      "cve": "CVE-2022-23181",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-23181"
    },
    {
      "cve": "CVE-2022-23833",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-23833"
    },
    {
      "cve": "CVE-2022-23852",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-23852"
    },
    {
      "cve": "CVE-2022-23943",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-23943"
    },
    {
      "cve": "CVE-2022-23990",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-23990"
    },
    {
      "cve": "CVE-2022-24407",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-24407"
    },
    {
      "cve": "CVE-2022-25235",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-25235"
    },
    {
      "cve": "CVE-2022-25236",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-25236"
    },
    {
      "cve": "CVE-2022-25313",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-25313"
    },
    {
      "cve": "CVE-2022-25314",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-25314"
    },
    {
      "cve": "CVE-2022-25315",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-25315"
    },
    {
      "cve": "CVE-2022-26381",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-26381"
    },
    {
      "cve": "CVE-2022-26383",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-26383"
    },
    {
      "cve": "CVE-2022-26384",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-26384"
    },
    {
      "cve": "CVE-2022-26386",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-26386"
    },
    {
      "cve": "CVE-2022-26387",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-26387"
    },
    {
      "cve": "CVE-2022-26485",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-26485"
    },
    {
      "cve": "CVE-2022-26486",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-26486"
    }
  ]
}
  WID-SEC-W-2022-0432
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-0432 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0432.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-0432 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0432"
      },
      {
        "category": "external",
        "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04",
        "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf"
      },
      {
        "category": "external",
        "summary": "Xerox Mini Bulletin XRX21A vom 2022-06-21",
        "url": "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-014-FreeFlow-Print-Server-v9.pdf"
      }
    ],
    "source_lang": "en-US",
    "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2023-04-03T22:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:29:02.928+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2022-0432",
      "initial_release_date": "2022-06-21T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-06-21T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2023-04-03T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von XEROX aufgenommen"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Xerox FreeFlow Print Server 9",
                "product": {
                  "name": "Xerox FreeFlow Print Server 9",
                  "product_id": "T002977",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:xerox:freeflow_print_server:9"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Xerox FreeFlow Print Server v9",
                "product": {
                  "name": "Xerox FreeFlow Print Server v9",
                  "product_id": "T015632",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:xerox:freeflow_print_server:v9"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "FreeFlow Print Server"
          }
        ],
        "category": "vendor",
        "name": "Xerox"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-2124",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2016-2124"
    },
    {
      "cve": "CVE-2019-14822",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2019-14822"
    },
    {
      "cve": "CVE-2019-19906",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2019-19906"
    },
    {
      "cve": "CVE-2020-15250",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2020-15250"
    },
    {
      "cve": "CVE-2020-17049",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2020-17049"
    },
    {
      "cve": "CVE-2020-25717",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2020-25717"
    },
    {
      "cve": "CVE-2020-25718",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2020-25718"
    },
    {
      "cve": "CVE-2020-25719",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2020-25719"
    },
    {
      "cve": "CVE-2020-25721",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2020-25721"
    },
    {
      "cve": "CVE-2020-25722",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2020-25722"
    },
    {
      "cve": "CVE-2020-9484",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2020-9484"
    },
    {
      "cve": "CVE-2021-21707",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-21707"
    },
    {
      "cve": "CVE-2021-22926",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-22926"
    },
    {
      "cve": "CVE-2021-23192",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-23192"
    },
    {
      "cve": "CVE-2021-27815",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-27815"
    },
    {
      "cve": "CVE-2021-30846",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-30846"
    },
    {
      "cve": "CVE-2021-30848",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-30848"
    },
    {
      "cve": "CVE-2021-30849",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-30849"
    },
    {
      "cve": "CVE-2021-30851",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-30851"
    },
    {
      "cve": "CVE-2021-30858",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-30858"
    },
    {
      "cve": "CVE-2021-33430",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-33430"
    },
    {
      "cve": "CVE-2021-34141",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-34141"
    },
    {
      "cve": "CVE-2021-35604",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-35604"
    },
    {
      "cve": "CVE-2021-35624",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-35624"
    },
    {
      "cve": "CVE-2021-3572",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3572"
    },
    {
      "cve": "CVE-2021-3711",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3711"
    },
    {
      "cve": "CVE-2021-3733",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3733"
    },
    {
      "cve": "CVE-2021-3737",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3737"
    },
    {
      "cve": "CVE-2021-3738",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3738"
    },
    {
      "cve": "CVE-2021-3770",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3770"
    },
    {
      "cve": "CVE-2021-3778",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3778"
    },
    {
      "cve": "CVE-2021-3796",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3796"
    },
    {
      "cve": "CVE-2021-38115",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-38115"
    },
    {
      "cve": "CVE-2021-3872",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3872"
    },
    {
      "cve": "CVE-2021-3875",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3875"
    },
    {
      "cve": "CVE-2021-3903",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3903"
    },
    {
      "cve": "CVE-2021-39212",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39212"
    },
    {
      "cve": "CVE-2021-39272",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39272"
    },
    {
      "cve": "CVE-2021-3928",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3928"
    },
    {
      "cve": "CVE-2021-3968",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3968"
    },
    {
      "cve": "CVE-2021-3973",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3973"
    },
    {
      "cve": "CVE-2021-3974",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3974"
    },
    {
      "cve": "CVE-2021-3984",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-3984"
    },
    {
      "cve": "CVE-2021-39920",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39920"
    },
    {
      "cve": "CVE-2021-39921",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39921"
    },
    {
      "cve": "CVE-2021-39922",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39922"
    },
    {
      "cve": "CVE-2021-39923",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39923"
    },
    {
      "cve": "CVE-2021-39924",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39924"
    },
    {
      "cve": "CVE-2021-39925",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39925"
    },
    {
      "cve": "CVE-2021-39926",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39926"
    },
    {
      "cve": "CVE-2021-39928",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39928"
    },
    {
      "cve": "CVE-2021-39929",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-39929"
    },
    {
      "cve": "CVE-2021-4008",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4008"
    },
    {
      "cve": "CVE-2021-4009",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4009"
    },
    {
      "cve": "CVE-2021-4010",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4010"
    },
    {
      "cve": "CVE-2021-4011",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4011"
    },
    {
      "cve": "CVE-2021-40145",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-40145"
    },
    {
      "cve": "CVE-2021-4019",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4019"
    },
    {
      "cve": "CVE-2021-4034",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4034"
    },
    {
      "cve": "CVE-2021-4069",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4069"
    },
    {
      "cve": "CVE-2021-40812",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-40812"
    },
    {
      "cve": "CVE-2021-41133",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-41133"
    },
    {
      "cve": "CVE-2021-4140",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4140"
    },
    {
      "cve": "CVE-2021-41495",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-41495"
    },
    {
      "cve": "CVE-2021-41496",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-41496"
    },
    {
      "cve": "CVE-2021-4181",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4181"
    },
    {
      "cve": "CVE-2021-41817",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-41817"
    },
    {
      "cve": "CVE-2021-41819",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-41819"
    },
    {
      "cve": "CVE-2021-4182",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4182"
    },
    {
      "cve": "CVE-2021-4183",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4183"
    },
    {
      "cve": "CVE-2021-4184",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4184"
    },
    {
      "cve": "CVE-2021-4185",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-4185"
    },
    {
      "cve": "CVE-2021-42717",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-42717"
    },
    {
      "cve": "CVE-2021-42762",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-42762"
    },
    {
      "cve": "CVE-2021-43331",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43331"
    },
    {
      "cve": "CVE-2021-43332",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43332"
    },
    {
      "cve": "CVE-2021-43395",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43395"
    },
    {
      "cve": "CVE-2021-43527",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43527"
    },
    {
      "cve": "CVE-2021-43528",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43528"
    },
    {
      "cve": "CVE-2021-43536",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43536"
    },
    {
      "cve": "CVE-2021-43537",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43537"
    },
    {
      "cve": "CVE-2021-43538",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43538"
    },
    {
      "cve": "CVE-2021-43539",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43539"
    },
    {
      "cve": "CVE-2021-43541",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43541"
    },
    {
      "cve": "CVE-2021-43542",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43542"
    },
    {
      "cve": "CVE-2021-43543",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43543"
    },
    {
      "cve": "CVE-2021-43545",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43545"
    },
    {
      "cve": "CVE-2021-43546",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43546"
    },
    {
      "cve": "CVE-2021-43566",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43566"
    },
    {
      "cve": "CVE-2021-43818",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-43818"
    },
    {
      "cve": "CVE-2021-44142",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44142"
    },
    {
      "cve": "CVE-2021-44224",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44224"
    },
    {
      "cve": "CVE-2021-44227",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44227"
    },
    {
      "cve": "CVE-2021-44420",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44420"
    },
    {
      "cve": "CVE-2021-44531",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44531"
    },
    {
      "cve": "CVE-2021-44532",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44532"
    },
    {
      "cve": "CVE-2021-44533",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44533"
    },
    {
      "cve": "CVE-2021-44540",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44540"
    },
    {
      "cve": "CVE-2021-44541",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44541"
    },
    {
      "cve": "CVE-2021-44542",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44542"
    },
    {
      "cve": "CVE-2021-44543",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44543"
    },
    {
      "cve": "CVE-2021-44790",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-44790"
    },
    {
      "cve": "CVE-2021-45078",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-45078"
    },
    {
      "cve": "CVE-2021-45115",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-45115"
    },
    {
      "cve": "CVE-2021-45116",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-45116"
    },
    {
      "cve": "CVE-2021-45452",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-45452"
    },
    {
      "cve": "CVE-2021-45960",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-45960"
    },
    {
      "cve": "CVE-2021-46143",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2021-46143"
    },
    {
      "cve": "CVE-2022-0336",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0336"
    },
    {
      "cve": "CVE-2022-0391",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0391"
    },
    {
      "cve": "CVE-2022-0566",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0566"
    },
    {
      "cve": "CVE-2022-0581",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0581"
    },
    {
      "cve": "CVE-2022-0582",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0582"
    },
    {
      "cve": "CVE-2022-0583",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0583"
    },
    {
      "cve": "CVE-2022-0585",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0585"
    },
    {
      "cve": "CVE-2022-0586",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0586"
    },
    {
      "cve": "CVE-2022-0778",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-0778"
    },
    {
      "cve": "CVE-2022-21248",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21248"
    },
    {
      "cve": "CVE-2022-21263",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21263"
    },
    {
      "cve": "CVE-2022-21271",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21271"
    },
    {
      "cve": "CVE-2022-21282",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21282"
    },
    {
      "cve": "CVE-2022-21291",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21291"
    },
    {
      "cve": "CVE-2022-21293",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21293"
    },
    {
      "cve": "CVE-2022-21294",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21294"
    },
    {
      "cve": "CVE-2022-21296",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21296"
    },
    {
      "cve": "CVE-2022-21298",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21298"
    },
    {
      "cve": "CVE-2022-21299",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21299"
    },
    {
      "cve": "CVE-2022-21305",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21305"
    },
    {
      "cve": "CVE-2022-21340",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21340"
    },
    {
      "cve": "CVE-2022-21341",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21341"
    },
    {
      "cve": "CVE-2022-21349",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21349"
    },
    {
      "cve": "CVE-2022-21360",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21360"
    },
    {
      "cve": "CVE-2022-21365",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21365"
    },
    {
      "cve": "CVE-2022-21375",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21375"
    },
    {
      "cve": "CVE-2022-21384",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21384"
    },
    {
      "cve": "CVE-2022-21416",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21416"
    },
    {
      "cve": "CVE-2022-21446",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21446"
    },
    {
      "cve": "CVE-2022-21461",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21461"
    },
    {
      "cve": "CVE-2022-21463",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21463"
    },
    {
      "cve": "CVE-2022-21493",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21493"
    },
    {
      "cve": "CVE-2022-21494",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21494"
    },
    {
      "cve": "CVE-2022-21712",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21712"
    },
    {
      "cve": "CVE-2022-21716",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21716"
    },
    {
      "cve": "CVE-2022-21824",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-21824"
    },
    {
      "cve": "CVE-2022-22719",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22719"
    },
    {
      "cve": "CVE-2022-22720",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22720"
    },
    {
      "cve": "CVE-2022-22721",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22721"
    },
    {
      "cve": "CVE-2022-22737",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22737"
    },
    {
      "cve": "CVE-2022-22738",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22738"
    },
    {
      "cve": "CVE-2022-22739",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22739"
    },
    {
      "cve": "CVE-2022-22740",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22740"
    },
    {
      "cve": "CVE-2022-22741",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22741"
    },
    {
      "cve": "CVE-2022-22742",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22742"
    },
    {
      "cve": "CVE-2022-22743",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22743"
    },
    {
      "cve": "CVE-2022-22744",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22744"
    },
    {
      "cve": "CVE-2022-22745",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22745"
    },
    {
      "cve": "CVE-2022-22746",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22746"
    },
    {
      "cve": "CVE-2022-22747",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22747"
    },
    {
      "cve": "CVE-2022-22748",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22748"
    },
    {
      "cve": "CVE-2022-22751",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22751"
    },
    {
      "cve": "CVE-2022-22753",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22753"
    },
    {
      "cve": "CVE-2022-22754",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22754"
    },
    {
      "cve": "CVE-2022-22756",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22756"
    },
    {
      "cve": "CVE-2022-22759",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22759"
    },
    {
      "cve": "CVE-2022-22760",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22760"
    },
    {
      "cve": "CVE-2022-22761",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22761"
    },
    {
      "cve": "CVE-2022-22763",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22763"
    },
    {
      "cve": "CVE-2022-22764",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22764"
    },
    {
      "cve": "CVE-2022-22815",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22815"
    },
    {
      "cve": "CVE-2022-22816",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22816"
    },
    {
      "cve": "CVE-2022-22817",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22817"
    },
    {
      "cve": "CVE-2022-22818",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22818"
    },
    {
      "cve": "CVE-2022-22822",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22822"
    },
    {
      "cve": "CVE-2022-22823",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22823"
    },
    {
      "cve": "CVE-2022-22824",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22824"
    },
    {
      "cve": "CVE-2022-22825",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22825"
    },
    {
      "cve": "CVE-2022-22826",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22826"
    },
    {
      "cve": "CVE-2022-22827",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-22827"
    },
    {
      "cve": "CVE-2022-23181",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-23181"
    },
    {
      "cve": "CVE-2022-23833",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-23833"
    },
    {
      "cve": "CVE-2022-23852",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-23852"
    },
    {
      "cve": "CVE-2022-23943",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-23943"
    },
    {
      "cve": "CVE-2022-23990",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-23990"
    },
    {
      "cve": "CVE-2022-24407",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-24407"
    },
    {
      "cve": "CVE-2022-25235",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-25235"
    },
    {
      "cve": "CVE-2022-25236",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-25236"
    },
    {
      "cve": "CVE-2022-25313",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-25313"
    },
    {
      "cve": "CVE-2022-25314",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-25314"
    },
    {
      "cve": "CVE-2022-25315",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-25315"
    },
    {
      "cve": "CVE-2022-26381",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-26381"
    },
    {
      "cve": "CVE-2022-26383",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-26383"
    },
    {
      "cve": "CVE-2022-26384",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-26384"
    },
    {
      "cve": "CVE-2022-26386",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-26386"
    },
    {
      "cve": "CVE-2022-26387",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-26387"
    },
    {
      "cve": "CVE-2022-26485",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-26485"
    },
    {
      "cve": "CVE-2022-26486",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden."
        }
      ],
      "product_status": {
        "known_affected": [
          "T015632",
          "T002977"
        ]
      },
      "release_date": "2022-06-21T22:00:00.000+00:00",
      "title": "CVE-2022-26486"
    }
  ]
}
  WID-SEC-W-2022-0302
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-0302 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0302.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-0302 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0302"
      },
      {
        "category": "external",
        "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04",
        "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf"
      },
      {
        "category": "external",
        "summary": "Xerox Security Bulletin XRX22-015",
        "url": "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-015-FreeFlow-Print-Server-v7.pdf"
      },
      {
        "category": "external",
        "summary": "Xerox Security Bulletin XRX22-013 vom 2022-06-14",
        "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-013-FreeFlow-Print-Server-v9.pdf"
      },
      {
        "category": "external",
        "summary": "Xerox Security Bulletin XRX22-012 vom 2022-06-14",
        "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-012-FreeFlow-Printer.pdf"
      }
    ],
    "source_lang": "en-US",
    "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen erm\u00f6glichen Ausf\u00fchren von beliebigem Programmcode mit Administratorrechten",
    "tracking": {
      "current_release_date": "2023-04-03T22:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:27:55.136+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2022-0302",
      "initial_release_date": "2022-06-14T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-06-14T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2022-06-21T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von XEROX aufgenommen"
        },
        {
          "date": "2023-04-03T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von XEROX aufgenommen"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Xerox FreeFlow Print Server 7",
                "product": {
                  "name": "Xerox FreeFlow Print Server 7",
                  "product_id": "T000872",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:xerox:freeflow_print_server:7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Xerox FreeFlow Print Server 9",
                "product": {
                  "name": "Xerox FreeFlow Print Server 9",
                  "product_id": "T002977",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:xerox:freeflow_print_server:9"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "FreeFlow Print Server"
          }
        ],
        "category": "vendor",
        "name": "Xerox"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-2124",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2016-2124"
    },
    {
      "cve": "CVE-2019-14822",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2019-14822"
    },
    {
      "cve": "CVE-2019-19906",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2019-19906"
    },
    {
      "cve": "CVE-2020-15250",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2020-15250"
    },
    {
      "cve": "CVE-2020-17049",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2020-17049"
    },
    {
      "cve": "CVE-2020-25717",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2020-25717"
    },
    {
      "cve": "CVE-2020-25718",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2020-25718"
    },
    {
      "cve": "CVE-2020-25719",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2020-25719"
    },
    {
      "cve": "CVE-2020-25721",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2020-25721"
    },
    {
      "cve": "CVE-2020-25722",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2020-25722"
    },
    {
      "cve": "CVE-2020-9484",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2020-9484"
    },
    {
      "cve": "CVE-2021-21707",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-21707"
    },
    {
      "cve": "CVE-2021-22926",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-22926"
    },
    {
      "cve": "CVE-2021-23192",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-23192"
    },
    {
      "cve": "CVE-2021-27815",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-27815"
    },
    {
      "cve": "CVE-2021-30846",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-30846"
    },
    {
      "cve": "CVE-2021-30848",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-30848"
    },
    {
      "cve": "CVE-2021-30849",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-30849"
    },
    {
      "cve": "CVE-2021-30851",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-30851"
    },
    {
      "cve": "CVE-2021-30858",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-30858"
    },
    {
      "cve": "CVE-2021-33430",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-33430"
    },
    {
      "cve": "CVE-2021-34141",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-34141"
    },
    {
      "cve": "CVE-2021-35604",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-35604"
    },
    {
      "cve": "CVE-2021-35624",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-35624"
    },
    {
      "cve": "CVE-2021-3572",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3572"
    },
    {
      "cve": "CVE-2021-3711",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3711"
    },
    {
      "cve": "CVE-2021-3733",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3733"
    },
    {
      "cve": "CVE-2021-3737",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3737"
    },
    {
      "cve": "CVE-2021-3738",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3738"
    },
    {
      "cve": "CVE-2021-3770",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3770"
    },
    {
      "cve": "CVE-2021-3778",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3778"
    },
    {
      "cve": "CVE-2021-3796",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3796"
    },
    {
      "cve": "CVE-2021-38115",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-38115"
    },
    {
      "cve": "CVE-2021-3872",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3872"
    },
    {
      "cve": "CVE-2021-3875",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3875"
    },
    {
      "cve": "CVE-2021-3903",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3903"
    },
    {
      "cve": "CVE-2021-39212",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39212"
    },
    {
      "cve": "CVE-2021-39272",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39272"
    },
    {
      "cve": "CVE-2021-3928",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3928"
    },
    {
      "cve": "CVE-2021-3968",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3968"
    },
    {
      "cve": "CVE-2021-3973",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3973"
    },
    {
      "cve": "CVE-2021-3974",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3974"
    },
    {
      "cve": "CVE-2021-3984",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-3984"
    },
    {
      "cve": "CVE-2021-39920",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39920"
    },
    {
      "cve": "CVE-2021-39921",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39921"
    },
    {
      "cve": "CVE-2021-39922",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39922"
    },
    {
      "cve": "CVE-2021-39923",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39923"
    },
    {
      "cve": "CVE-2021-39924",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39924"
    },
    {
      "cve": "CVE-2021-39925",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39925"
    },
    {
      "cve": "CVE-2021-39926",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39926"
    },
    {
      "cve": "CVE-2021-39928",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39928"
    },
    {
      "cve": "CVE-2021-39929",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-39929"
    },
    {
      "cve": "CVE-2021-4008",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4008"
    },
    {
      "cve": "CVE-2021-4009",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4009"
    },
    {
      "cve": "CVE-2021-4010",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4010"
    },
    {
      "cve": "CVE-2021-4011",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4011"
    },
    {
      "cve": "CVE-2021-40145",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-40145"
    },
    {
      "cve": "CVE-2021-4019",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4019"
    },
    {
      "cve": "CVE-2021-4034",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4034"
    },
    {
      "cve": "CVE-2021-4069",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4069"
    },
    {
      "cve": "CVE-2021-40812",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-40812"
    },
    {
      "cve": "CVE-2021-41133",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-41133"
    },
    {
      "cve": "CVE-2021-4140",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4140"
    },
    {
      "cve": "CVE-2021-41495",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-41495"
    },
    {
      "cve": "CVE-2021-41496",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-41496"
    },
    {
      "cve": "CVE-2021-4160",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4160"
    },
    {
      "cve": "CVE-2021-4181",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4181"
    },
    {
      "cve": "CVE-2021-41817",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-41817"
    },
    {
      "cve": "CVE-2021-41819",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-41819"
    },
    {
      "cve": "CVE-2021-4182",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4182"
    },
    {
      "cve": "CVE-2021-4183",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4183"
    },
    {
      "cve": "CVE-2021-4184",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4184"
    },
    {
      "cve": "CVE-2021-4185",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-4185"
    },
    {
      "cve": "CVE-2021-42717",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-42717"
    },
    {
      "cve": "CVE-2021-42762",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-42762"
    },
    {
      "cve": "CVE-2021-43331",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43331"
    },
    {
      "cve": "CVE-2021-43332",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43332"
    },
    {
      "cve": "CVE-2021-43395",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43395"
    },
    {
      "cve": "CVE-2021-43527",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43527"
    },
    {
      "cve": "CVE-2021-43528",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43528"
    },
    {
      "cve": "CVE-2021-43536",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43536"
    },
    {
      "cve": "CVE-2021-43537",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43537"
    },
    {
      "cve": "CVE-2021-43538",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43538"
    },
    {
      "cve": "CVE-2021-43539",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43539"
    },
    {
      "cve": "CVE-2021-43541",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43541"
    },
    {
      "cve": "CVE-2021-43542",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43542"
    },
    {
      "cve": "CVE-2021-43543",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43543"
    },
    {
      "cve": "CVE-2021-43545",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43545"
    },
    {
      "cve": "CVE-2021-43546",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43546"
    },
    {
      "cve": "CVE-2021-43566",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43566"
    },
    {
      "cve": "CVE-2021-43818",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-43818"
    },
    {
      "cve": "CVE-2021-44142",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44142"
    },
    {
      "cve": "CVE-2021-44224",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44224"
    },
    {
      "cve": "CVE-2021-44227",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44227"
    },
    {
      "cve": "CVE-2021-44420",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44420"
    },
    {
      "cve": "CVE-2021-44531",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44531"
    },
    {
      "cve": "CVE-2021-44532",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44532"
    },
    {
      "cve": "CVE-2021-44533",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44533"
    },
    {
      "cve": "CVE-2021-44540",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44540"
    },
    {
      "cve": "CVE-2021-44541",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44541"
    },
    {
      "cve": "CVE-2021-44542",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44542"
    },
    {
      "cve": "CVE-2021-44543",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44543"
    },
    {
      "cve": "CVE-2021-44790",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-44790"
    },
    {
      "cve": "CVE-2021-45078",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-45078"
    },
    {
      "cve": "CVE-2021-45115",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-45115"
    },
    {
      "cve": "CVE-2021-45116",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-45116"
    },
    {
      "cve": "CVE-2021-45452",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-45452"
    },
    {
      "cve": "CVE-2021-45960",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-45960"
    },
    {
      "cve": "CVE-2021-46143",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2021-46143"
    },
    {
      "cve": "CVE-2022-0336",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0336"
    },
    {
      "cve": "CVE-2022-0391",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0391"
    },
    {
      "cve": "CVE-2022-0566",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0566"
    },
    {
      "cve": "CVE-2022-0581",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0581"
    },
    {
      "cve": "CVE-2022-0582",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0582"
    },
    {
      "cve": "CVE-2022-0583",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0583"
    },
    {
      "cve": "CVE-2022-0585",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0585"
    },
    {
      "cve": "CVE-2022-0586",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0586"
    },
    {
      "cve": "CVE-2022-0778",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-0778"
    },
    {
      "cve": "CVE-2022-21248",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21248"
    },
    {
      "cve": "CVE-2022-21263",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21263"
    },
    {
      "cve": "CVE-2022-21271",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21271"
    },
    {
      "cve": "CVE-2022-21282",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21282"
    },
    {
      "cve": "CVE-2022-21291",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21291"
    },
    {
      "cve": "CVE-2022-21293",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21293"
    },
    {
      "cve": "CVE-2022-21294",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21294"
    },
    {
      "cve": "CVE-2022-21296",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21296"
    },
    {
      "cve": "CVE-2022-21298",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21298"
    },
    {
      "cve": "CVE-2022-21299",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21299"
    },
    {
      "cve": "CVE-2022-21305",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21305"
    },
    {
      "cve": "CVE-2022-21340",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21340"
    },
    {
      "cve": "CVE-2022-21341",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21341"
    },
    {
      "cve": "CVE-2022-21349",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21349"
    },
    {
      "cve": "CVE-2022-21360",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21360"
    },
    {
      "cve": "CVE-2022-21365",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21365"
    },
    {
      "cve": "CVE-2022-21375",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21375"
    },
    {
      "cve": "CVE-2022-21384",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21384"
    },
    {
      "cve": "CVE-2022-21416",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21416"
    },
    {
      "cve": "CVE-2022-21446",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21446"
    },
    {
      "cve": "CVE-2022-21461",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21461"
    },
    {
      "cve": "CVE-2022-21463",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21463"
    },
    {
      "cve": "CVE-2022-21493",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21493"
    },
    {
      "cve": "CVE-2022-21494",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21494"
    },
    {
      "cve": "CVE-2022-21712",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21712"
    },
    {
      "cve": "CVE-2022-21716",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21716"
    },
    {
      "cve": "CVE-2022-21824",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-21824"
    },
    {
      "cve": "CVE-2022-22719",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22719"
    },
    {
      "cve": "CVE-2022-22720",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22720"
    },
    {
      "cve": "CVE-2022-22721",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22721"
    },
    {
      "cve": "CVE-2022-22737",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22737"
    },
    {
      "cve": "CVE-2022-22738",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22738"
    },
    {
      "cve": "CVE-2022-22739",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22739"
    },
    {
      "cve": "CVE-2022-22740",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22740"
    },
    {
      "cve": "CVE-2022-22741",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22741"
    },
    {
      "cve": "CVE-2022-22742",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22742"
    },
    {
      "cve": "CVE-2022-22743",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22743"
    },
    {
      "cve": "CVE-2022-22744",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22744"
    },
    {
      "cve": "CVE-2022-22745",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22745"
    },
    {
      "cve": "CVE-2022-22746",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22746"
    },
    {
      "cve": "CVE-2022-22747",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22747"
    },
    {
      "cve": "CVE-2022-22748",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22748"
    },
    {
      "cve": "CVE-2022-22751",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22751"
    },
    {
      "cve": "CVE-2022-22753",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22753"
    },
    {
      "cve": "CVE-2022-22754",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22754"
    },
    {
      "cve": "CVE-2022-22756",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22756"
    },
    {
      "cve": "CVE-2022-22759",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22759"
    },
    {
      "cve": "CVE-2022-22760",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22760"
    },
    {
      "cve": "CVE-2022-22761",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22761"
    },
    {
      "cve": "CVE-2022-22763",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22763"
    },
    {
      "cve": "CVE-2022-22764",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22764"
    },
    {
      "cve": "CVE-2022-22815",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22815"
    },
    {
      "cve": "CVE-2022-22816",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22816"
    },
    {
      "cve": "CVE-2022-22817",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22817"
    },
    {
      "cve": "CVE-2022-22818",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22818"
    },
    {
      "cve": "CVE-2022-22822",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22822"
    },
    {
      "cve": "CVE-2022-22823",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22823"
    },
    {
      "cve": "CVE-2022-22824",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22824"
    },
    {
      "cve": "CVE-2022-22825",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22825"
    },
    {
      "cve": "CVE-2022-22826",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22826"
    },
    {
      "cve": "CVE-2022-22827",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-22827"
    },
    {
      "cve": "CVE-2022-23181",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-23181"
    },
    {
      "cve": "CVE-2022-23833",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-23833"
    },
    {
      "cve": "CVE-2022-23852",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-23852"
    },
    {
      "cve": "CVE-2022-23943",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-23943"
    },
    {
      "cve": "CVE-2022-23990",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-23990"
    },
    {
      "cve": "CVE-2022-24407",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-24407"
    },
    {
      "cve": "CVE-2022-25235",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-25235"
    },
    {
      "cve": "CVE-2022-25236",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-25236"
    },
    {
      "cve": "CVE-2022-25313",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-25313"
    },
    {
      "cve": "CVE-2022-25314",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-25314"
    },
    {
      "cve": "CVE-2022-25315",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-25315"
    },
    {
      "cve": "CVE-2022-26381",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-26381"
    },
    {
      "cve": "CVE-2022-26383",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-26383"
    },
    {
      "cve": "CVE-2022-26384",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-26384"
    },
    {
      "cve": "CVE-2022-26386",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-26386"
    },
    {
      "cve": "CVE-2022-26387",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-26387"
    },
    {
      "cve": "CVE-2022-26485",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-26485"
    },
    {
      "cve": "CVE-2022-26486",
      "notes": [
        {
          "category": "description",
          "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T000872",
          "T002977"
        ]
      },
      "release_date": "2022-06-14T22:00:00.000+00:00",
      "title": "CVE-2022-26486"
    }
  ]
}
  wid-sec-w-2023-0426
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "IBM Spectrum Protect ist eine zentralisierte Backupl\u00f6sung f\u00fcr Systeme im Netzwerk.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, sensible Informationen offenzulegen und seine Privilegien zu erweitern.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- Sonstiges\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-0426 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0426.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-0426 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0426"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory vom 2022-03-13",
        "url": "https://www.ibm.com/support/pages/node/6562989"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory vom 2022-03-13",
        "url": "https://www.ibm.com/support/pages/node/6562383"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory vom 2022-03-13",
        "url": "https://www.ibm.com/support/pages/node/6562855"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory vom 2022-03-13",
        "url": "https://www.ibm.com/support/pages/node/6562401"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory vom 2022-03-13",
        "url": "https://www.ibm.com/support/pages/node/6562919"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory vom 2022-03-13",
        "url": "https://www.ibm.com/support/pages/node/6562873"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory vom 2022-03-13",
        "url": "https://www.ibm.com/support/pages/node/6562843"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory vom 2022-03-13",
        "url": "https://www.ibm.com/support/pages/node/6562405"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 6956658 vom 2023-02-18",
        "url": "https://www.ibm.com/support/pages/node/6956658"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7180361 vom 2025-01-07",
        "url": "https://www.ibm.com/support/pages/node/7180361"
      }
    ],
    "source_lang": "en-US",
    "title": "IBM Spectrum Protect: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-01-06T23:00:00.000+00:00",
      "generator": {
        "date": "2025-01-07T11:48:17.558+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.10"
        }
      },
      "id": "WID-SEC-W-2023-0426",
      "initial_release_date": "2022-03-13T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-03-13T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2023-02-19T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-01-06T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von IBM aufgenommen"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "7.6.1.2",
                "product": {
                  "name": "IBM Maximo Asset Management 7.6.1.2",
                  "product_id": "T026420",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:maximo_asset_management:7.6.1.2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "7.6.1.3",
                "product": {
                  "name": "IBM Maximo Asset Management 7.6.1.3",
                  "product_id": "T026421",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:maximo_asset_management:7.6.1.3"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Maximo Asset Management"
          },
          {
            "category": "product_name",
            "name": "IBM Spectrum Protect",
            "product": {
              "name": "IBM Spectrum Protect",
              "product_id": "T013661",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:spectrum_protect:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c10.1.6.4",
                "product": {
                  "name": "IBM Spectrum Protect Plus \u003c10.1.6.4",
                  "product_id": "T040030"
                }
              },
              {
                "category": "product_version",
                "name": "10.1.6.4",
                "product": {
                  "name": "IBM Spectrum Protect Plus 10.1.6.4",
                  "product_id": "T040030-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Spectrum Protect Plus"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-20373",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-20373"
    },
    {
      "cve": "CVE-2021-23222",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-23222"
    },
    {
      "cve": "CVE-2021-23727",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-23727"
    },
    {
      "cve": "CVE-2021-29678",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-29678"
    },
    {
      "cve": "CVE-2021-33026",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-33026"
    },
    {
      "cve": "CVE-2021-35517",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-35517"
    },
    {
      "cve": "CVE-2021-35578",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-35578"
    },
    {
      "cve": "CVE-2021-36090",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-36090"
    },
    {
      "cve": "CVE-2021-38926",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-38926"
    },
    {
      "cve": "CVE-2021-38931",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-38931"
    },
    {
      "cve": "CVE-2021-39002",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-39002"
    },
    {
      "cve": "CVE-2021-4034",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-4034"
    },
    {
      "cve": "CVE-2021-41617",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-41617"
    },
    {
      "cve": "CVE-2021-44716",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-44716"
    },
    {
      "cve": "CVE-2021-44717",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2021-44717"
    },
    {
      "cve": "CVE-2022-0235",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-0235"
    },
    {
      "cve": "CVE-2022-0391",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-0391"
    },
    {
      "cve": "CVE-2022-21680",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-21680"
    },
    {
      "cve": "CVE-2022-21681",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-21681"
    },
    {
      "cve": "CVE-2022-22346",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-22346"
    },
    {
      "cve": "CVE-2022-22348",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-22348"
    },
    {
      "cve": "CVE-2022-22354",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-22354"
    },
    {
      "cve": "CVE-2022-23772",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-23772"
    },
    {
      "cve": "CVE-2022-23773",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-23773"
    },
    {
      "cve": "CVE-2022-23806",
      "notes": [
        {
          "category": "description",
          "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten PostgreSQL, Apache Commons Compress, Operations Center, Celery, Golang Go, Python, Db2, Java SE, Polkit, Node.js, OpenSSH und Flask. Ein entfernter anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen \u0027Denial of Service\u0027-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen \u0027Cross-Site-Scripting\u0027-Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T040030",
          "T013661",
          "T026421",
          "T026420"
        ]
      },
      "release_date": "2022-03-13T23:00:00.000+00:00",
      "title": "CVE-2022-23806"
    }
  ]
}
  wid-sec-w-2022-1483
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "PolicyKit ist ein Berechtigungsdienst, der die Kommunikation zwischen Benutzersoftware und Systemkomponenten erlaubt, wenn die Benutzersoftware dazu berechtigt ist.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann eine Schwachstelle in PolicyKit ausnutzen, um seine Privilegien zu erh\u00f6hen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- UNIX\n- Linux",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-1483 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1483.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-1483 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1483"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0265 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0265"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0266 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0266"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0267 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0267"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0268 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0268"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0269 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0269"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0270 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0270"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0271 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0271"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0272 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0272"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0273 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0273"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0274 vom 2022-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2022:0274"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-0274 vom 2022-01-25",
        "url": "http://linux.oracle.com/errata/ELSA-2022-0274.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory vom 2022-01-25",
        "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00026.html"
      },
      {
        "category": "external",
        "summary": "SUSE Linux Security Update vom 2022-01-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010074.html"
      },
      {
        "category": "external",
        "summary": "SUSE Linux Security Update vom 2022-01-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010075.html"
      },
      {
        "category": "external",
        "summary": "SUSE Linux Security Update vom 2022-01-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010076.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5252-1 vom 2022-01-25",
        "url": "https://ubuntu.com/security/notices/USN-5252-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5252-1 vom 2022-01-25",
        "url": "https://ubuntu.com/security/notices/USN-5252-2"
      },
      {
        "category": "external",
        "summary": "Exploit",
        "url": "https://www.bleepingcomputer.com/news/security/linux-system-service-bug-gives-root-on-all-major-distros-exploit-released/"
      },
      {
        "category": "external",
        "summary": "Qualys Advisory CVE-2021-4034 vom 2022-01-25",
        "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2022:0274 vom 2022-01-26",
        "url": "https://lists.centos.org/pipermail/centos-announce/2022-January/073552.html"
      },
      {
        "category": "external",
        "summary": "Gentoo Linux Security Advisory GLSA-202201-01 vom 2022-01-27",
        "url": "https://security.gentoo.org/glsa/202201-01"
      },
      {
        "category": "external",
        "summary": "IGEL Security Notice ISN-2022-01 vom 2022-01-27",
        "url": "https://kb.igel.com/securitysafety/en/isn-2022-01-polkit-escalation-of-privilege-54093876.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-1745 vom 2022-01-27",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1745.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-016 vom 2022-01-27",
        "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-016.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-9073 vom 2022-01-28",
        "url": "http://linux.oracle.com/errata/ELSA-2022-9073.html"
      },
      {
        "category": "external",
        "summary": "Aruba Product Security Advisory",
        "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-003.txt"
      },
      {
        "category": "external",
        "summary": "Extreme Networks Security Advisory",
        "url": "https://extremeportal.force.com/ExtrArticleDetail?an=000102362"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2022-010 vom 2021-01-31",
        "url": "https://downloads.avaya.com/css/P8/documents/101080366"
      },
      {
        "category": "external",
        "summary": "AVAYA Security Advisory ASA-2022-007 vom 2021-01-31",
        "url": "https://downloads.avaya.com/css/P8/documents/101080315"
      },
      {
        "category": "external",
        "summary": "Unify Security Advisory Report",
        "url": "https://networks.unify.com/security/advisories/OBSO-2202-01.pdf"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0443 vom 2022-02-08",
        "url": "https://access.redhat.com/errata/RHSA-2022:0443"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:0540 vom 2022-02-15",
        "url": "https://access.redhat.com/errata/RHSA-2022:0540"
      },
      {
        "category": "external",
        "summary": "ORACLE OVMSA-2022-0006 vom 2022-02-17",
        "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2022-February/001046.html"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739\u0026elq_cid=62517953\u0026docId=hpesbnw04237en_us"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739\u0026elq_cid=67018031\u0026docId=hpesbnw04237en_us"
      },
      {
        "category": "external",
        "summary": "Arch Linux Security Advisory ASA-202204-2 vom 2022-04-05",
        "url": "https://security.archlinux.org/ASA-202204-2"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 6621599 vom 2022-09-21",
        "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-maximo-asset-management-is-vulnerable-to-authentication-bypass-cve-2022-40616/"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-9999 vom 2022-11-16",
        "url": "http://linux.oracle.com/errata/ELSA-2022-9999.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-220 vom 2022-12-09",
        "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-220.html"
      },
      {
        "category": "external",
        "summary": "ExtremeNetworks Vulnerability Notice SA-2022-001 vom 2024-01-09",
        "url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000102362"
      }
    ],
    "source_lang": "en-US",
    "title": "PolicyKit: Schwachstelle erm\u00f6glicht Privilegieneskalation",
    "tracking": {
      "current_release_date": "2024-01-08T23:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:35:29.086+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2022-1483",
      "initial_release_date": "2022-01-25T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-01-25T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2022-01-26T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von CentOS aufgenommen"
        },
        {
          "date": "2022-01-27T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Gentoo, IGEL und Amazon aufgenommen"
        },
        {
          "date": "2022-01-30T23:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2022-02-01T23:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Aruba aufgenommen"
        },
        {
          "date": "2022-02-02T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Unify, ExtremeNetworks und AVAYA aufgenommen"
        },
        {
          "date": "2022-02-07T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-02-15T23:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-02-16T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von ORACLE aufgenommen"
        },
        {
          "date": "2022-02-24T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von HP aufgenommen"
        },
        {
          "date": "2022-03-03T23:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2022-04-04T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Arch Linux aufgenommen"
        },
        {
          "date": "2022-09-20T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2022-11-16T23:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2022-12-11T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-01-08T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von ExtremeNetworks aufgenommen"
        }
      ],
      "status": "final",
      "version": "16"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Aruba ArubaOS",
            "product": {
              "name": "Aruba ArubaOS",
              "product_id": "T021926",
              "product_identification_helper": {
                "cpe": "cpe:/o:arubanetworks:arubaos:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Aruba ClearPass",
            "product": {
              "name": "Aruba ClearPass",
              "product_id": "T022183",
              "product_identification_helper": {
                "cpe": "cpe:/a:arubanetworks:clearpass:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Aruba ClearPass Policy Manager",
            "product": {
              "name": "Aruba ClearPass Policy Manager",
              "product_id": "274506",
              "product_identification_helper": {
                "cpe": "cpe:/a:arubanetworks:clearpass_policy_manager:6.3.0.60730"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Aruba Switch",
            "product": {
              "name": "Aruba Switch",
              "product_id": "T016786",
              "product_identification_helper": {
                "cpe": "cpe:/h:arubanetworks:switch:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Aruba"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Avaya Aura Application Enablement Services",
            "product": {
              "name": "Avaya Aura Application Enablement Services",
              "product_id": "T015516",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_application_enablement_services:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura Communication Manager",
            "product": {
              "name": "Avaya Aura Communication Manager",
              "product_id": "T015126",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:communication_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura Experience Portal",
            "product": {
              "name": "Avaya Aura Experience Portal",
              "product_id": "T015519",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_experience_portal:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura Session Manager",
            "product": {
              "name": "Avaya Aura Session Manager",
              "product_id": "T015127",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:session_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Aura System Manager",
            "product": {
              "name": "Avaya Aura System Manager",
              "product_id": "T015518",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:aura_system_manager:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Avaya Web License Manager",
            "product": {
              "name": "Avaya Web License Manager",
              "product_id": "T016243",
              "product_identification_helper": {
                "cpe": "cpe:/a:avaya:web_license_manager:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Avaya"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Debian Linux",
                "product": {
                  "name": "Debian Linux",
                  "product_id": "2951",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:debian:debian_linux:-"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Debian Linux 9",
                "product": {
                  "name": "Debian Linux 9",
                  "product_id": "T021835",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:debian:debian_linux:9"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Linux"
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Extreme Networks Extreme Management Center",
            "product": {
              "name": "Extreme Networks Extreme Management Center",
              "product_id": "T020453",
              "product_identification_helper": {
                "cpe": "cpe:/a:extremenetworks:netsight:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Extreme Networks HiveManager Classic On-Premises \u003c XIQ",
            "product": {
              "name": "Extreme Networks HiveManager Classic On-Premises \u003c XIQ",
              "product_id": "T031896",
              "product_identification_helper": {
                "cpe": "cpe:/a:extremenetworks:hivemanager:xiq::classic_on-premises"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Extreme Networks"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "IBM Maximo Asset Management",
            "product": {
              "name": "IBM Maximo Asset Management",
              "product_id": "T024664",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:maximo_asset_management:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "IGEL OS",
            "product": {
              "name": "IGEL OS",
              "product_id": "T017865",
              "product_identification_helper": {
                "cpe": "cpe:/o:igel:os:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "IGEL"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source Arch Linux",
            "product": {
              "name": "Open Source Arch Linux",
              "product_id": "T013312",
              "product_identification_helper": {
                "cpe": "cpe:/o:archlinux:archlinux:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Open Source CentOS",
            "product": {
              "name": "Open Source CentOS",
              "product_id": "1727",
              "product_identification_helper": {
                "cpe": "cpe:/o:centos:centos:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Open Source PolicyKit",
            "product": {
              "name": "Open Source PolicyKit",
              "product_id": "T005505",
              "product_identification_helper": {
                "cpe": "cpe:/a:policykit:policykit:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Oracle Linux 7",
                "product": {
                  "name": "Oracle Linux 7",
                  "product_id": "287065",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:oracle:linux:7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Oracle Linux",
                "product": {
                  "name": "Oracle Linux",
                  "product_id": "T004914",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:oracle:linux:-"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Linux"
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7",
                "product": {
                  "name": "Red Hat Enterprise Linux 7",
                  "product_id": "T007578",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 8.4 Extended Update Support",
                "product": {
                  "name": "Red Hat Enterprise Linux 8.4 Extended Update Support",
                  "product_id": "T021022",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8.4_extended_update_support"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 8.2 Extended Update Support.",
                "product": {
                  "name": "Red Hat Enterprise Linux 8.2 Extended Update Support.",
                  "product_id": "T021823",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8.2_extended_update_support."
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions",
                "product": {
                  "name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions",
                  "product_id": "T021824",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8.1_update_services_for_sap_solutions"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 6 Extended Lifecycle Support",
                "product": {
                  "name": "Red Hat Enterprise Linux 6 Extended Lifecycle Support",
                  "product_id": "T021825",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6_extended_lifecycle_support"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7.3 Advanced Update Support",
                "product": {
                  "name": "Red Hat Enterprise Linux 7.3 Advanced Update Support",
                  "product_id": "T021826",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7.3_advanced_update_support"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7.6 Advanced Update Support",
                "product": {
                  "name": "Red Hat Enterprise Linux 7.6 Advanced Update Support",
                  "product_id": "T021827",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7.6_advanced_update_support"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7.6 Telco Extended Update Support",
                "product": {
                  "name": "Red Hat Enterprise Linux 7.6 Telco Extended Update Support",
                  "product_id": "T021828",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7.6_telco_extended_update_support"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions",
                "product": {
                  "name": "Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions",
                  "product_id": "T021829",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7.6_update_services_for_sap_solutions"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7.4 Advanced Update Support",
                "product": {
                  "name": "Red Hat Enterprise Linux 7.4 Advanced Update Support",
                  "product_id": "T021830",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7.4_advanced_update_support"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7.7 Advanced Update Support",
                "product": {
                  "name": "Red Hat Enterprise Linux 7.7 Advanced Update Support",
                  "product_id": "T021831",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7.7_advanced_update_support"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7.7 Telco Extended Update Support",
                "product": {
                  "name": "Red Hat Enterprise Linux 7.7 Telco Extended Update Support",
                  "product_id": "T021832",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7.7_telco_extended_update_support"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions",
                "product": {
                  "name": "Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions",
                  "product_id": "T021833",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7.7_update_services_for_sap_solutions"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12",
                  "product_id": "T021836",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_linux:enterprise_server_12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP 12",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP 12",
                  "product_id": "T021837",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_linux:enterprise_server_for_sap_12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12",
                  "product_id": "T021838",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_linux:enterprise_software_development_kit_12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 12",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 12",
                  "product_id": "T021839",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_linux:enterprise_workstation_extension_12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15",
                  "product_id": "T021840",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_linux:enterprise_server_15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP 15",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP 15",
                  "product_id": "T021842",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_linux:enterprise_server_for_sap_15"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Linux"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Manager Server 4.1",
                "product": {
                  "name": "SUSE Manager Server 4.1",
                  "product_id": "T021843",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:suse:manager:server_4.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Retail Branch Server 4.1",
                "product": {
                  "name": "SUSE Manager Retail Branch Server 4.1",
                  "product_id": "T021844",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:suse:manager:retail_branch_server_4.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Proxy 4.1",
                "product": {
                  "name": "SUSE Manager Proxy 4.1",
                  "product_id": "T021845",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:suse:manager:proxy_4.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Manager"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu Linux 18.04",
                "product": {
                  "name": "Ubuntu Linux 18.04",
                  "product_id": "353835",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:canonical:ubuntu_linux:18.04"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Ubuntu Linux 20.04",
                "product": {
                  "name": "Ubuntu Linux 20.04",
                  "product_id": "T019179",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:canonical:ubuntu_linux:20.04"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Ubuntu Linux 14.04 ESM",
                "product": {
                  "name": "Ubuntu Linux 14.04 ESM",
                  "product_id": "T021846",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:canonical:ubuntu_linux:14.04_esm"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Ubuntu Linux 16.04 ESM",
                "product": {
                  "name": "Ubuntu Linux 16.04 ESM",
                  "product_id": "T021847",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:canonical:ubuntu_linux:16.04_esm"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Ubuntu Linux 21.10",
                "product": {
                  "name": "Ubuntu Linux 21.10",
                  "product_id": "T021848",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:canonical:ubuntu_linux:21.10"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Linux"
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Unify OpenScape Voice",
            "product": {
              "name": "Unify OpenScape Voice",
              "product_id": "T008873",
              "product_identification_helper": {
                "cpe": "cpe:/a:unify:openscape_voice:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Unify OpenScape Xpert Clients",
            "product": {
              "name": "Unify OpenScape Xpert Clients",
              "product_id": "T021945",
              "product_identification_helper": {
                "cpe": "cpe:/h:unify:openscape_xpert:::client"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Unify"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-4034",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in PolicyKit (polkit) im \"pkexec\" Dienstprogramm aufgrund eines Out-of-bound write und eines Out-of-bounds read. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien auf \"root\" zu erweitern."
        }
      ],
      "product_status": {
        "known_affected": [
          "T008873",
          "T031896",
          "T015127",
          "T021926",
          "T015126",
          "T021848",
          "T021847",
          "T004914",
          "T019179",
          "398363",
          "T022183",
          "287065",
          "T007578",
          "T015519",
          "T015518",
          "T015516",
          "T012167",
          "T016243",
          "T020453",
          "2951",
          "T021824",
          "T021945",
          "T021823",
          "T021022",
          "T005505",
          "T021828",
          "T021827",
          "T021826",
          "T021825",
          "T021829",
          "T021831",
          "T021830",
          "T021835",
          "T021833",
          "T021832",
          "T024664",
          "353835",
          "T013312",
          "T021839",
          "T021838",
          "T021837",
          "T016786",
          "T021836",
          "T021842",
          "T021840",
          "T021846",
          "T017865",
          "T021845",
          "T021844",
          "T021843",
          "1727",
          "274506"
        ]
      },
      "release_date": "2022-01-25T23:00:00.000+00:00",
      "title": "CVE-2021-4034"
    }
  ]
}
  SCA-2022-0002
Vulnerability from csaf_sick
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "audience": "all",
        "category": "summary",
        "text": "CVE-2021-4034 is a Local Privilege Escalation (LPE) vulnerability, located in the \"Polkit\" package \ninstalled by default on almost every major distribution of the Linux operating system.\n\nOn 2022-01-25, Qualys released an advisory for this LPE vulnerability, advising to either update the \u201cPolkit\u201d package or implement the mitigation that Qualys recommends.\n\nIn an air-gapped system SICK recommends all customers to implement at least the available mitigation for the corresponding Linux distribution. Please note, that this vulnerability can be exploited only if an user with unprivileged authorization can establish a connection to the systems. "
      },
      {
        "category": "general",
        "text": "As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.",
        "title": "General Security Measures"
      },
      {
        "category": "general",
        "text": "SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer\u2019s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.",
        "title": "Vulnerability Classification"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "psirt@sick.de",
      "issuing_authority": "SICK AG issues and issues in EHS products (when related to the Endress+Hauser SICK (EHS) joint venture).",
      "name": "SICK PSIRT",
      "namespace": "https://www.sick.com/psirt"
    },
    "references": [
      {
        "summary": "SICK PSIRT Security Advisories",
        "url": "https://sick.com/psirt"
      },
      {
        "summary": "SICK Operating Guidelines",
        "url": "https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf"
      },
      {
        "summary": "ICS-CERT recommended practices on Industrial Security",
        "url": "http://ics-cert.us-cert.gov/content/recommended-practices"
      },
      {
        "summary": "CVSS v3.1 Calculator",
        "url": "https://www.first.org/cvss/calculator/3.1"
      },
      {
        "category": "self",
        "summary": "The canonical URL.",
        "url": "https://www.sick.com/.well-known/csaf/white/2022/sca-2022-0002.json"
      }
    ],
    "title": "PwnKit vulnerability affects multiple SICK IPCs",
    "tracking": {
      "current_release_date": "2022-02-23T16:00:00.000Z",
      "generator": {
        "date": "2023-02-10T09:01:25.481Z",
        "engine": {
          "name": "Secvisogram",
          "version": "2.0.0"
        }
      },
      "id": "SCA-2022-0002",
      "initial_release_date": "2022-02-23T16:00:00.000Z",
      "revision_history": [
        {
          "date": "2022-02-23T16:00:00.000Z",
          "number": "1",
          "summary": "Initial release"
        },
        {
          "date": "2023-02-10T11:00:00.000Z",
          "number": "2",
          "summary": "Updated Advisory (only visual changes)"
        },
        {
          "date": "2025-07-30T07:29:45.000Z",
          "number": "3",
          "summary": "Updated Advisory: URL for SICK Operating Guidelines has been updated"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE5401, M16G, 1TB, LINUX, CUSTOM all versions",
                  "product_id": "CSAFPID-0001",
                  "product_identification_helper": {
                    "skus": [
                      "1111424"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE5401, M16G, 1TB, LINUX, CUSTOM"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE5401, M16G, 2TB, C7 all versions",
                  "product_id": "CSAFPID-0002",
                  "product_identification_helper": {
                    "skus": [
                      "1099249"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE5401, M16G, 2TB, C7"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE5401, M16G, 1TB, C7 all versions",
                  "product_id": "CSAFPID-0003",
                  "product_identification_helper": {
                    "skus": [
                      "1099248"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE5401, M16G, 1TB, C7"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, EOS1300, M16G, 1TB, C7 all versions",
                  "product_id": "CSAFPID-0004",
                  "product_identification_helper": {
                    "skus": [
                      "1092516"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, EOS1300, M16G, 1TB, C7"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, EOS1300, M16G, 2TB, C7 all versions",
                  "product_id": "CSAFPID-0005",
                  "product_identification_helper": {
                    "skus": [
                      "1092517"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, EOS1300, M16G, 2TB, C7"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5401, SSCT, R0, 2TB all versions",
                  "product_id": "CSAFPID-0006",
                  "product_identification_helper": {
                    "skus": [
                      "2084896",
                      "2098056"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5401, SSCT, R0, 2TB"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5401,R0,2TB,SS-X all versions",
                  "product_id": "CSAFPID-0007",
                  "product_identification_helper": {
                    "skus": [
                      "2095232"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5401,R0,2TB,SS-X"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5401,R0,2TB,UDS-X all versions",
                  "product_id": "CSAFPID-0008",
                  "product_identification_helper": {
                    "skus": [
                      "2104564"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5401,R0,2TB,UDS-X"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5321, SSXT, R0, 2TB all versions",
                  "product_id": "CSAFPID-0009",
                  "product_identification_helper": {
                    "skus": [
                      "2084076"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5321, SSXT, R0, 2TB"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5321, SSAT, R0, 2TB all versions",
                  "product_id": "CSAFPID-0010",
                  "product_identification_helper": {
                    "skus": [
                      "2084077"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5321, SSAT, R0, 2TB"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5321, UDS, R0, 2TB all versions",
                  "product_id": "CSAFPID-0011",
                  "product_identification_helper": {
                    "skus": [
                      "2084078"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5321, UDS, R0, 2TB"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5401, SSAT, R0, 2TB all versions",
                  "product_id": "CSAFPID-0012",
                  "product_identification_helper": {
                    "skus": [
                      "2084897"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5401, SSAT, R0, 2TB"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5401, UDS, R0, 2TB all versions",
                  "product_id": "CSAFPID-0013",
                  "product_identification_helper": {
                    "skus": [
                      "2084898"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5401, UDS, R0, 2TB"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5401, SP, R0,2TB all versions",
                  "product_id": "CSAFPID-0014",
                  "product_identification_helper": {
                    "skus": [
                      "2099100"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5401, SP, R0,2TB"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC-MXE 5401, CUSTOM, C6, 1TB all versions",
                  "product_id": "CSAFPID-0015",
                  "product_identification_helper": {
                    "skus": [
                      "2056761"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC-MXE 5401, CUSTOM, C6, 1TB"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK ERGO,DISP,KIT,C6X,CUSTOM all versions",
                  "product_id": "CSAFPID-0016",
                  "product_identification_helper": {
                    "skus": [
                      "2087772"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "ERGO,DISP,KIT,C6X,CUSTOM"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, K700-SE-MS4X, M16G, 1TB all versions",
                  "product_id": "CSAFPID-0017",
                  "product_identification_helper": {
                    "skus": [
                      "1122338"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, K700-SE-MS4X, M16G, 1TB"
          }
        ],
        "category": "vendor",
        "name": "SICK AG"
      }
    ],
    "full_product_names": [
      {
        "name": "CentOS",
        "product_id": "CSAFPID-0018"
      },
      {
        "name": "RedHat",
        "product_id": "CSAFPID-0019"
      },
      {
        "name": "Ubuntu",
        "product_id": "CSAFPID-0020"
      }
    ],
    "relationships": [
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE5401, M16G, 1TB, LINUX, CUSTOM all versions (CentOS)",
          "product_id": "CSAFPID-0021"
        },
        "product_reference": "CSAFPID-0018",
        "relates_to_product_reference": "CSAFPID-0001"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE5401, M16G, 2TB, C7 all versions (CentOS)",
          "product_id": "CSAFPID-0022"
        },
        "product_reference": "CSAFPID-0018",
        "relates_to_product_reference": "CSAFPID-0002"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE5401, M16G, 1TB, C7 all versions (CentOS)",
          "product_id": "CSAFPID-0023"
        },
        "product_reference": "CSAFPID-0018",
        "relates_to_product_reference": "CSAFPID-0003"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, EOS1300, M16G, 1TB, C7 all versions (CentOS)",
          "product_id": "CSAFPID-0024"
        },
        "product_reference": "CSAFPID-0018",
        "relates_to_product_reference": "CSAFPID-0004"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, EOS1300, M16G, 2TB, C7 all versions (CentOS)",
          "product_id": "CSAFPID-0025"
        },
        "product_reference": "CSAFPID-0018",
        "relates_to_product_reference": "CSAFPID-0005"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5401,R0,2TB,SS-X all versions (RedHat)",
          "product_id": "CSAFPID-0026"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0006"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5401,R0,2TB,UDS-X all versions (RedHat)",
          "product_id": "CSAFPID-0027"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0007"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5321, SSXT, R0, 2TB all versions (RedHat)",
          "product_id": "CSAFPID-0028"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0008"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5321, SSAT, R0, 2TB all versions (RedHat)",
          "product_id": "CSAFPID-0029"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0009"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5321, UDS, R0, 2TB all versions (RedHat)",
          "product_id": "CSAFPID-0030"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0010"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5401, SSAT, R0, 2TB all versions (RedHat)",
          "product_id": "CSAFPID-0031"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0011"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5401, UDS, R0, 2TB all versions (RedHat)",
          "product_id": "CSAFPID-0032"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0012"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5401, SSCT, R0, 2TB all versions (RedHat)",
          "product_id": "CSAFPID-0033"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0013"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5401, SP, R0,2TB all versions (RedHat)",
          "product_id": "CSAFPID-0034"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0014"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC-MXE 5401, CUSTOM, C6, 1TB all versions (CentOS)",
          "product_id": "CSAFPID-0035"
        },
        "product_reference": "CSAFPID-0018",
        "relates_to_product_reference": "CSAFPID-0015"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK ERGO,DISP,KIT,C6X,CUSTOM all versions (CentOS)",
          "product_id": "CSAFPID-0036"
        },
        "product_reference": "CSAFPID-0018",
        "relates_to_product_reference": "CSAFPID-0016"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, K700-SE-MS4X, M16G, 1TB all versions (Ubuntu)",
          "product_id": "CSAFPID-0037"
        },
        "product_reference": "CSAFPID-0020",
        "relates_to_product_reference": "CSAFPID-0017"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-01-31T16:00:00.000Z",
      "notes": [
        {
          "category": "description",
          "text": "The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to \nexecute environment variables as commands. An attacker can leverage this by crafting environment \nvariables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the \nattack can cause a local privilege escalation given unprivileged users administrative rights on the \ntarget machine."
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-0021",
          "CSAFPID-0022",
          "CSAFPID-0023",
          "CSAFPID-0024",
          "CSAFPID-0025",
          "CSAFPID-0026",
          "CSAFPID-0027",
          "CSAFPID-0028",
          "CSAFPID-0029",
          "CSAFPID-0030",
          "CSAFPID-0031",
          "CSAFPID-0032",
          "CSAFPID-0033",
          "CSAFPID-0034",
          "CSAFPID-0035",
          "CSAFPID-0036",
          "CSAFPID-0037"
        ]
      },
      "references": [
        {
          "summary": "Qualys Advisory",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-23T16:00:00.000Z",
          "details": "Update to newest version",
          "product_ids": [
            "CSAFPID-0021",
            "CSAFPID-0022",
            "CSAFPID-0023",
            "CSAFPID-0024",
            "CSAFPID-0025",
            "CSAFPID-0026",
            "CSAFPID-0027",
            "CSAFPID-0028",
            "CSAFPID-0029",
            "CSAFPID-0030",
            "CSAFPID-0031",
            "CSAFPID-0032",
            "CSAFPID-0033",
            "CSAFPID-0034",
            "CSAFPID-0035",
            "CSAFPID-0036",
            "CSAFPID-0037"
          ]
        },
        {
          "category": "mitigation",
          "details": "- In case your SICK IPC for Analytics has been set up normally, without a \u201ckiosk\u201d mode:\n\n    - Log in as the \\\u003croot\\\u003e user (credentials will be supplied separately).\n\n    - Start the \\\u003cterminal\\\u003e app.\n\n    - At the command prompt, enter the following command: \\\u003cchmod 0755 /usr/bin/pkexec\\\u003e\n\n    - Log out from \\\u003croot\\\u003e\n\n- In case your SICK IPC for Analytics has been set up in \u201ckiosk\u201d mode:\n\n    Note: In this below example, the OS is assumed to be CentOS 6.8 running a Gnome 2.28.2 GUI with SICK Package Analytics pre-installed and running on Kiosk mode.\n\n    - These instructions start from the default kiosk-mode display of Package analytics.\n    \n    - Press \\\u003cCTRL+F4\\\u003e on the keyboard. This will bring up the desktop for the \\\u003cguest\\\u003e user.\n\n    - Select the green \u201crunning man\u201d icon in the upper right.\n\n    - Select \\\u003cLog Out\\\u003e in the dialog box.\n\n    - In the ensuing dialog, press \\\u003cCancel\\\u003e. It\u2019s on a timer, so this step has to be done quickly.\n\n    - This brings up a display that allows the user to log in to other accounts. Select \\\u003cother\\\u003e.\n\n    - Enter \\\u003croot\\\u003e as the username.\n\n    - Enter the root password. Note this will be provided in a separate email.\n\n    - This brings up the root desktop. Click on the black terminal icon at the top of the display to bring up the command line prompt.\n\n    - At the command line, enter the following command: \\\u003cchmod 0755 /usr/bin/pkexec\\\u003e\n\n    - Click on the \\\u003cx\\\u003e in the upper right to close the terminal window.\n\n    - As before click on the \u201crunning man\u201d icon at the top of the display to bring up the logout screen.\n    \n    - Select \\\u003cLog Out\\\u003e in the ensuing dialogue.\n\nThis completes the process. The system will automatically back in as the guest kiosk user.",
          "product_ids": [
            "CSAFPID-0021",
            "CSAFPID-0022",
            "CSAFPID-0023",
            "CSAFPID-0024",
            "CSAFPID-0025",
            "CSAFPID-0026",
            "CSAFPID-0027",
            "CSAFPID-0028",
            "CSAFPID-0029",
            "CSAFPID-0030",
            "CSAFPID-0031",
            "CSAFPID-0032",
            "CSAFPID-0033",
            "CSAFPID-0034",
            "CSAFPID-0035",
            "CSAFPID-0036",
            "CSAFPID-0037"
          ],
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001#mitigation"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0021",
            "CSAFPID-0022",
            "CSAFPID-0023",
            "CSAFPID-0024",
            "CSAFPID-0025",
            "CSAFPID-0026",
            "CSAFPID-0027",
            "CSAFPID-0028",
            "CSAFPID-0029",
            "CSAFPID-0030",
            "CSAFPID-0031",
            "CSAFPID-0032",
            "CSAFPID-0033",
            "CSAFPID-0034",
            "CSAFPID-0035",
            "CSAFPID-0036",
            "CSAFPID-0037"
          ]
        }
      ],
      "title": "CVE-2021-4034 Out-of-bounds Write"
    }
  ]
}
  sca-2022-0002
Vulnerability from csaf_sick
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "audience": "all",
        "category": "summary",
        "text": "CVE-2021-4034 is a Local Privilege Escalation (LPE) vulnerability, located in the \"Polkit\" package \ninstalled by default on almost every major distribution of the Linux operating system.\n\nOn 2022-01-25, Qualys released an advisory for this LPE vulnerability, advising to either update the \u201cPolkit\u201d package or implement the mitigation that Qualys recommends.\n\nIn an air-gapped system SICK recommends all customers to implement at least the available mitigation for the corresponding Linux distribution. Please note, that this vulnerability can be exploited only if an user with unprivileged authorization can establish a connection to the systems. "
      },
      {
        "category": "general",
        "text": "As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.",
        "title": "General Security Measures"
      },
      {
        "category": "general",
        "text": "SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer\u2019s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.",
        "title": "Vulnerability Classification"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "psirt@sick.de",
      "issuing_authority": "SICK AG issues and issues in EHS products (when related to the Endress+Hauser SICK (EHS) joint venture).",
      "name": "SICK PSIRT",
      "namespace": "https://www.sick.com/psirt"
    },
    "references": [
      {
        "summary": "SICK PSIRT Security Advisories",
        "url": "https://sick.com/psirt"
      },
      {
        "summary": "SICK Operating Guidelines",
        "url": "https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf"
      },
      {
        "summary": "ICS-CERT recommended practices on Industrial Security",
        "url": "http://ics-cert.us-cert.gov/content/recommended-practices"
      },
      {
        "summary": "CVSS v3.1 Calculator",
        "url": "https://www.first.org/cvss/calculator/3.1"
      },
      {
        "category": "self",
        "summary": "The canonical URL.",
        "url": "https://www.sick.com/.well-known/csaf/white/2022/sca-2022-0002.json"
      }
    ],
    "title": "PwnKit vulnerability affects multiple SICK IPCs",
    "tracking": {
      "current_release_date": "2022-02-23T16:00:00.000Z",
      "generator": {
        "date": "2023-02-10T09:01:25.481Z",
        "engine": {
          "name": "Secvisogram",
          "version": "2.0.0"
        }
      },
      "id": "SCA-2022-0002",
      "initial_release_date": "2022-02-23T16:00:00.000Z",
      "revision_history": [
        {
          "date": "2022-02-23T16:00:00.000Z",
          "number": "1",
          "summary": "Initial release"
        },
        {
          "date": "2023-02-10T11:00:00.000Z",
          "number": "2",
          "summary": "Updated Advisory (only visual changes)"
        },
        {
          "date": "2025-07-30T07:29:45.000Z",
          "number": "3",
          "summary": "Updated Advisory: URL for SICK Operating Guidelines has been updated"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE5401, M16G, 1TB, LINUX, CUSTOM all versions",
                  "product_id": "CSAFPID-0001",
                  "product_identification_helper": {
                    "skus": [
                      "1111424"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE5401, M16G, 1TB, LINUX, CUSTOM"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE5401, M16G, 2TB, C7 all versions",
                  "product_id": "CSAFPID-0002",
                  "product_identification_helper": {
                    "skus": [
                      "1099249"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE5401, M16G, 2TB, C7"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE5401, M16G, 1TB, C7 all versions",
                  "product_id": "CSAFPID-0003",
                  "product_identification_helper": {
                    "skus": [
                      "1099248"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE5401, M16G, 1TB, C7"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, EOS1300, M16G, 1TB, C7 all versions",
                  "product_id": "CSAFPID-0004",
                  "product_identification_helper": {
                    "skus": [
                      "1092516"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, EOS1300, M16G, 1TB, C7"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, EOS1300, M16G, 2TB, C7 all versions",
                  "product_id": "CSAFPID-0005",
                  "product_identification_helper": {
                    "skus": [
                      "1092517"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, EOS1300, M16G, 2TB, C7"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5401, SSCT, R0, 2TB all versions",
                  "product_id": "CSAFPID-0006",
                  "product_identification_helper": {
                    "skus": [
                      "2084896",
                      "2098056"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5401, SSCT, R0, 2TB"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5401,R0,2TB,SS-X all versions",
                  "product_id": "CSAFPID-0007",
                  "product_identification_helper": {
                    "skus": [
                      "2095232"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5401,R0,2TB,SS-X"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5401,R0,2TB,UDS-X all versions",
                  "product_id": "CSAFPID-0008",
                  "product_identification_helper": {
                    "skus": [
                      "2104564"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5401,R0,2TB,UDS-X"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5321, SSXT, R0, 2TB all versions",
                  "product_id": "CSAFPID-0009",
                  "product_identification_helper": {
                    "skus": [
                      "2084076"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5321, SSXT, R0, 2TB"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5321, SSAT, R0, 2TB all versions",
                  "product_id": "CSAFPID-0010",
                  "product_identification_helper": {
                    "skus": [
                      "2084077"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5321, SSAT, R0, 2TB"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5321, UDS, R0, 2TB all versions",
                  "product_id": "CSAFPID-0011",
                  "product_identification_helper": {
                    "skus": [
                      "2084078"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5321, UDS, R0, 2TB"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5401, SSAT, R0, 2TB all versions",
                  "product_id": "CSAFPID-0012",
                  "product_identification_helper": {
                    "skus": [
                      "2084897"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5401, SSAT, R0, 2TB"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5401, UDS, R0, 2TB all versions",
                  "product_id": "CSAFPID-0013",
                  "product_identification_helper": {
                    "skus": [
                      "2084898"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5401, UDS, R0, 2TB"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, MXE-5401, SP, R0,2TB all versions",
                  "product_id": "CSAFPID-0014",
                  "product_identification_helper": {
                    "skus": [
                      "2099100"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, MXE-5401, SP, R0,2TB"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC-MXE 5401, CUSTOM, C6, 1TB all versions",
                  "product_id": "CSAFPID-0015",
                  "product_identification_helper": {
                    "skus": [
                      "2056761"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC-MXE 5401, CUSTOM, C6, 1TB"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK ERGO,DISP,KIT,C6X,CUSTOM all versions",
                  "product_id": "CSAFPID-0016",
                  "product_identification_helper": {
                    "skus": [
                      "2087772"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "ERGO,DISP,KIT,C6X,CUSTOM"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICK PC, K700-SE-MS4X, M16G, 1TB all versions",
                  "product_id": "CSAFPID-0017",
                  "product_identification_helper": {
                    "skus": [
                      "1122338"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PC, K700-SE-MS4X, M16G, 1TB"
          }
        ],
        "category": "vendor",
        "name": "SICK AG"
      }
    ],
    "full_product_names": [
      {
        "name": "CentOS",
        "product_id": "CSAFPID-0018"
      },
      {
        "name": "RedHat",
        "product_id": "CSAFPID-0019"
      },
      {
        "name": "Ubuntu",
        "product_id": "CSAFPID-0020"
      }
    ],
    "relationships": [
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE5401, M16G, 1TB, LINUX, CUSTOM all versions (CentOS)",
          "product_id": "CSAFPID-0021"
        },
        "product_reference": "CSAFPID-0018",
        "relates_to_product_reference": "CSAFPID-0001"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE5401, M16G, 2TB, C7 all versions (CentOS)",
          "product_id": "CSAFPID-0022"
        },
        "product_reference": "CSAFPID-0018",
        "relates_to_product_reference": "CSAFPID-0002"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE5401, M16G, 1TB, C7 all versions (CentOS)",
          "product_id": "CSAFPID-0023"
        },
        "product_reference": "CSAFPID-0018",
        "relates_to_product_reference": "CSAFPID-0003"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, EOS1300, M16G, 1TB, C7 all versions (CentOS)",
          "product_id": "CSAFPID-0024"
        },
        "product_reference": "CSAFPID-0018",
        "relates_to_product_reference": "CSAFPID-0004"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, EOS1300, M16G, 2TB, C7 all versions (CentOS)",
          "product_id": "CSAFPID-0025"
        },
        "product_reference": "CSAFPID-0018",
        "relates_to_product_reference": "CSAFPID-0005"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5401,R0,2TB,SS-X all versions (RedHat)",
          "product_id": "CSAFPID-0026"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0006"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5401,R0,2TB,UDS-X all versions (RedHat)",
          "product_id": "CSAFPID-0027"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0007"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5321, SSXT, R0, 2TB all versions (RedHat)",
          "product_id": "CSAFPID-0028"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0008"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5321, SSAT, R0, 2TB all versions (RedHat)",
          "product_id": "CSAFPID-0029"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0009"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5321, UDS, R0, 2TB all versions (RedHat)",
          "product_id": "CSAFPID-0030"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0010"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5401, SSAT, R0, 2TB all versions (RedHat)",
          "product_id": "CSAFPID-0031"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0011"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5401, UDS, R0, 2TB all versions (RedHat)",
          "product_id": "CSAFPID-0032"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0012"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5401, SSCT, R0, 2TB all versions (RedHat)",
          "product_id": "CSAFPID-0033"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0013"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, MXE-5401, SP, R0,2TB all versions (RedHat)",
          "product_id": "CSAFPID-0034"
        },
        "product_reference": "CSAFPID-0019",
        "relates_to_product_reference": "CSAFPID-0014"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC-MXE 5401, CUSTOM, C6, 1TB all versions (CentOS)",
          "product_id": "CSAFPID-0035"
        },
        "product_reference": "CSAFPID-0018",
        "relates_to_product_reference": "CSAFPID-0015"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK ERGO,DISP,KIT,C6X,CUSTOM all versions (CentOS)",
          "product_id": "CSAFPID-0036"
        },
        "product_reference": "CSAFPID-0018",
        "relates_to_product_reference": "CSAFPID-0016"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK PC, K700-SE-MS4X, M16G, 1TB all versions (Ubuntu)",
          "product_id": "CSAFPID-0037"
        },
        "product_reference": "CSAFPID-0020",
        "relates_to_product_reference": "CSAFPID-0017"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-01-31T16:00:00.000Z",
      "notes": [
        {
          "category": "description",
          "text": "The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to \nexecute environment variables as commands. An attacker can leverage this by crafting environment \nvariables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the \nattack can cause a local privilege escalation given unprivileged users administrative rights on the \ntarget machine."
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-0021",
          "CSAFPID-0022",
          "CSAFPID-0023",
          "CSAFPID-0024",
          "CSAFPID-0025",
          "CSAFPID-0026",
          "CSAFPID-0027",
          "CSAFPID-0028",
          "CSAFPID-0029",
          "CSAFPID-0030",
          "CSAFPID-0031",
          "CSAFPID-0032",
          "CSAFPID-0033",
          "CSAFPID-0034",
          "CSAFPID-0035",
          "CSAFPID-0036",
          "CSAFPID-0037"
        ]
      },
      "references": [
        {
          "summary": "Qualys Advisory",
          "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-02-23T16:00:00.000Z",
          "details": "Update to newest version",
          "product_ids": [
            "CSAFPID-0021",
            "CSAFPID-0022",
            "CSAFPID-0023",
            "CSAFPID-0024",
            "CSAFPID-0025",
            "CSAFPID-0026",
            "CSAFPID-0027",
            "CSAFPID-0028",
            "CSAFPID-0029",
            "CSAFPID-0030",
            "CSAFPID-0031",
            "CSAFPID-0032",
            "CSAFPID-0033",
            "CSAFPID-0034",
            "CSAFPID-0035",
            "CSAFPID-0036",
            "CSAFPID-0037"
          ]
        },
        {
          "category": "mitigation",
          "details": "- In case your SICK IPC for Analytics has been set up normally, without a \u201ckiosk\u201d mode:\n\n    - Log in as the \\\u003croot\\\u003e user (credentials will be supplied separately).\n\n    - Start the \\\u003cterminal\\\u003e app.\n\n    - At the command prompt, enter the following command: \\\u003cchmod 0755 /usr/bin/pkexec\\\u003e\n\n    - Log out from \\\u003croot\\\u003e\n\n- In case your SICK IPC for Analytics has been set up in \u201ckiosk\u201d mode:\n\n    Note: In this below example, the OS is assumed to be CentOS 6.8 running a Gnome 2.28.2 GUI with SICK Package Analytics pre-installed and running on Kiosk mode.\n\n    - These instructions start from the default kiosk-mode display of Package analytics.\n    \n    - Press \\\u003cCTRL+F4\\\u003e on the keyboard. This will bring up the desktop for the \\\u003cguest\\\u003e user.\n\n    - Select the green \u201crunning man\u201d icon in the upper right.\n\n    - Select \\\u003cLog Out\\\u003e in the dialog box.\n\n    - In the ensuing dialog, press \\\u003cCancel\\\u003e. It\u2019s on a timer, so this step has to be done quickly.\n\n    - This brings up a display that allows the user to log in to other accounts. Select \\\u003cother\\\u003e.\n\n    - Enter \\\u003croot\\\u003e as the username.\n\n    - Enter the root password. Note this will be provided in a separate email.\n\n    - This brings up the root desktop. Click on the black terminal icon at the top of the display to bring up the command line prompt.\n\n    - At the command line, enter the following command: \\\u003cchmod 0755 /usr/bin/pkexec\\\u003e\n\n    - Click on the \\\u003cx\\\u003e in the upper right to close the terminal window.\n\n    - As before click on the \u201crunning man\u201d icon at the top of the display to bring up the logout screen.\n    \n    - Select \\\u003cLog Out\\\u003e in the ensuing dialogue.\n\nThis completes the process. The system will automatically back in as the guest kiosk user.",
          "product_ids": [
            "CSAFPID-0021",
            "CSAFPID-0022",
            "CSAFPID-0023",
            "CSAFPID-0024",
            "CSAFPID-0025",
            "CSAFPID-0026",
            "CSAFPID-0027",
            "CSAFPID-0028",
            "CSAFPID-0029",
            "CSAFPID-0030",
            "CSAFPID-0031",
            "CSAFPID-0032",
            "CSAFPID-0033",
            "CSAFPID-0034",
            "CSAFPID-0035",
            "CSAFPID-0036",
            "CSAFPID-0037"
          ],
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001#mitigation"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0021",
            "CSAFPID-0022",
            "CSAFPID-0023",
            "CSAFPID-0024",
            "CSAFPID-0025",
            "CSAFPID-0026",
            "CSAFPID-0027",
            "CSAFPID-0028",
            "CSAFPID-0029",
            "CSAFPID-0030",
            "CSAFPID-0031",
            "CSAFPID-0032",
            "CSAFPID-0033",
            "CSAFPID-0034",
            "CSAFPID-0035",
            "CSAFPID-0036",
            "CSAFPID-0037"
          ]
        }
      ],
      "title": "CVE-2021-4034 Out-of-bounds Write"
    }
  ]
}
  opensuse-su-2022:0190-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for polkit",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for polkit fixes the following issues:\n\n- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-SLE-15.3-2022-190",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0190-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2022:0190-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGEROI6PUOTOXKFIH2MPKUQ3PI6VWLXQ/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2022:0190-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGEROI6PUOTOXKFIH2MPKUQ3PI6VWLXQ/"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194568",
        "url": "https://bugzilla.suse.com/1194568"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4034 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4034/"
      }
    ],
    "title": "Security update for polkit",
    "tracking": {
      "current_release_date": "2022-01-25T18:10:19Z",
      "generator": {
        "date": "2022-01-25T18:10:19Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2022:0190-1",
      "initial_release_date": "2022-01-25T18:10:19Z",
      "revision_history": [
        {
          "date": "2022-01-25T18:10:19Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.116-3.6.1.aarch64",
                "product": {
                  "name": "libpolkit0-0.116-3.6.1.aarch64",
                  "product_id": "libpolkit0-0.116-3.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.116-3.6.1.aarch64",
                "product": {
                  "name": "polkit-0.116-3.6.1.aarch64",
                  "product_id": "polkit-0.116-3.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.116-3.6.1.aarch64",
                "product": {
                  "name": "polkit-devel-0.116-3.6.1.aarch64",
                  "product_id": "polkit-devel-0.116-3.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
                  "product_id": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-doc-0.116-3.6.1.noarch",
                "product": {
                  "name": "polkit-doc-0.116-3.6.1.noarch",
                  "product_id": "polkit-doc-0.116-3.6.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.116-3.6.1.ppc64le",
                "product": {
                  "name": "libpolkit0-0.116-3.6.1.ppc64le",
                  "product_id": "libpolkit0-0.116-3.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.116-3.6.1.ppc64le",
                "product": {
                  "name": "polkit-0.116-3.6.1.ppc64le",
                  "product_id": "polkit-0.116-3.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.116-3.6.1.ppc64le",
                "product": {
                  "name": "polkit-devel-0.116-3.6.1.ppc64le",
                  "product_id": "polkit-devel-0.116-3.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
                  "product_id": "typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.116-3.6.1.s390x",
                "product": {
                  "name": "libpolkit0-0.116-3.6.1.s390x",
                  "product_id": "libpolkit0-0.116-3.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.116-3.6.1.s390x",
                "product": {
                  "name": "polkit-0.116-3.6.1.s390x",
                  "product_id": "polkit-0.116-3.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.116-3.6.1.s390x",
                "product": {
                  "name": "polkit-devel-0.116-3.6.1.s390x",
                  "product_id": "polkit-devel-0.116-3.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
                  "product_id": "typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.116-3.6.1.x86_64",
                "product": {
                  "name": "libpolkit0-0.116-3.6.1.x86_64",
                  "product_id": "libpolkit0-0.116-3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit0-32bit-0.116-3.6.1.x86_64",
                "product": {
                  "name": "libpolkit0-32bit-0.116-3.6.1.x86_64",
                  "product_id": "libpolkit0-32bit-0.116-3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.116-3.6.1.x86_64",
                "product": {
                  "name": "polkit-0.116-3.6.1.x86_64",
                  "product_id": "polkit-0.116-3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.116-3.6.1.x86_64",
                "product": {
                  "name": "polkit-devel-0.116-3.6.1.x86_64",
                  "product_id": "polkit-devel-0.116-3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
                  "product_id": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.3",
                "product": {
                  "name": "openSUSE Leap 15.3",
                  "product_id": "openSUSE Leap 15.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:libpolkit0-0.116-3.6.1.aarch64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:libpolkit0-0.116-3.6.1.ppc64le"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:libpolkit0-0.116-3.6.1.s390x"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:libpolkit0-0.116-3.6.1.x86_64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-32bit-0.116-3.6.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:libpolkit0-32bit-0.116-3.6.1.x86_64"
        },
        "product_reference": "libpolkit0-32bit-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:polkit-0.116-3.6.1.aarch64"
        },
        "product_reference": "polkit-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:polkit-0.116-3.6.1.ppc64le"
        },
        "product_reference": "polkit-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:polkit-0.116-3.6.1.s390x"
        },
        "product_reference": "polkit-0.116-3.6.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:polkit-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:polkit-devel-0.116-3.6.1.aarch64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:polkit-devel-0.116-3.6.1.ppc64le"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:polkit-devel-0.116-3.6.1.s390x"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:polkit-devel-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-doc-0.116-3.6.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:polkit-doc-0.116-3.6.1.noarch"
        },
        "product_reference": "polkit-doc-0.116-3.6.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-4034",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4034"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:libpolkit0-0.116-3.6.1.aarch64",
          "openSUSE Leap 15.3:libpolkit0-0.116-3.6.1.ppc64le",
          "openSUSE Leap 15.3:libpolkit0-0.116-3.6.1.s390x",
          "openSUSE Leap 15.3:libpolkit0-0.116-3.6.1.x86_64",
          "openSUSE Leap 15.3:libpolkit0-32bit-0.116-3.6.1.x86_64",
          "openSUSE Leap 15.3:polkit-0.116-3.6.1.aarch64",
          "openSUSE Leap 15.3:polkit-0.116-3.6.1.ppc64le",
          "openSUSE Leap 15.3:polkit-0.116-3.6.1.s390x",
          "openSUSE Leap 15.3:polkit-0.116-3.6.1.x86_64",
          "openSUSE Leap 15.3:polkit-devel-0.116-3.6.1.aarch64",
          "openSUSE Leap 15.3:polkit-devel-0.116-3.6.1.ppc64le",
          "openSUSE Leap 15.3:polkit-devel-0.116-3.6.1.s390x",
          "openSUSE Leap 15.3:polkit-devel-0.116-3.6.1.x86_64",
          "openSUSE Leap 15.3:polkit-doc-0.116-3.6.1.noarch",
          "openSUSE Leap 15.3:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
          "openSUSE Leap 15.3:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
          "openSUSE Leap 15.3:typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
          "openSUSE Leap 15.3:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4034",
          "url": "https://www.suse.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194568 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1194568"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195125 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195125"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195136 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195136"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195246 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195246"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195265 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195265"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195278 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195278"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195528 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195528"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195541 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195541"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196165 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1196165"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196388 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1196388"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225668 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1225668"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:libpolkit0-0.116-3.6.1.aarch64",
            "openSUSE Leap 15.3:libpolkit0-0.116-3.6.1.ppc64le",
            "openSUSE Leap 15.3:libpolkit0-0.116-3.6.1.s390x",
            "openSUSE Leap 15.3:libpolkit0-0.116-3.6.1.x86_64",
            "openSUSE Leap 15.3:libpolkit0-32bit-0.116-3.6.1.x86_64",
            "openSUSE Leap 15.3:polkit-0.116-3.6.1.aarch64",
            "openSUSE Leap 15.3:polkit-0.116-3.6.1.ppc64le",
            "openSUSE Leap 15.3:polkit-0.116-3.6.1.s390x",
            "openSUSE Leap 15.3:polkit-0.116-3.6.1.x86_64",
            "openSUSE Leap 15.3:polkit-devel-0.116-3.6.1.aarch64",
            "openSUSE Leap 15.3:polkit-devel-0.116-3.6.1.ppc64le",
            "openSUSE Leap 15.3:polkit-devel-0.116-3.6.1.s390x",
            "openSUSE Leap 15.3:polkit-devel-0.116-3.6.1.x86_64",
            "openSUSE Leap 15.3:polkit-doc-0.116-3.6.1.noarch",
            "openSUSE Leap 15.3:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
            "openSUSE Leap 15.3:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
            "openSUSE Leap 15.3:typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
            "openSUSE Leap 15.3:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:libpolkit0-0.116-3.6.1.aarch64",
            "openSUSE Leap 15.3:libpolkit0-0.116-3.6.1.ppc64le",
            "openSUSE Leap 15.3:libpolkit0-0.116-3.6.1.s390x",
            "openSUSE Leap 15.3:libpolkit0-0.116-3.6.1.x86_64",
            "openSUSE Leap 15.3:libpolkit0-32bit-0.116-3.6.1.x86_64",
            "openSUSE Leap 15.3:polkit-0.116-3.6.1.aarch64",
            "openSUSE Leap 15.3:polkit-0.116-3.6.1.ppc64le",
            "openSUSE Leap 15.3:polkit-0.116-3.6.1.s390x",
            "openSUSE Leap 15.3:polkit-0.116-3.6.1.x86_64",
            "openSUSE Leap 15.3:polkit-devel-0.116-3.6.1.aarch64",
            "openSUSE Leap 15.3:polkit-devel-0.116-3.6.1.ppc64le",
            "openSUSE Leap 15.3:polkit-devel-0.116-3.6.1.s390x",
            "openSUSE Leap 15.3:polkit-devel-0.116-3.6.1.x86_64",
            "openSUSE Leap 15.3:polkit-doc-0.116-3.6.1.noarch",
            "openSUSE Leap 15.3:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
            "openSUSE Leap 15.3:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
            "openSUSE Leap 15.3:typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
            "openSUSE Leap 15.3:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-01-25T18:10:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4034"
    }
  ]
}
  opensuse-su-2024:11780-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "libpolkit-agent-1-0-0.120-2.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the libpolkit-agent-1-0-0.120-2.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-11780",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11780-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4034 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4034/"
      }
    ],
    "title": "libpolkit-agent-1-0-0.120-2.1 on GA media",
    "tracking": {
      "current_release_date": "2024-06-15T00:00:00Z",
      "generator": {
        "date": "2024-06-15T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:11780-1",
      "initial_release_date": "2024-06-15T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-06-15T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit-agent-1-0-0.120-2.1.aarch64",
                "product": {
                  "name": "libpolkit-agent-1-0-0.120-2.1.aarch64",
                  "product_id": "libpolkit-agent-1-0-0.120-2.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit-agent-1-0-32bit-0.120-2.1.aarch64",
                "product": {
                  "name": "libpolkit-agent-1-0-32bit-0.120-2.1.aarch64",
                  "product_id": "libpolkit-agent-1-0-32bit-0.120-2.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit-gobject-1-0-0.120-2.1.aarch64",
                "product": {
                  "name": "libpolkit-gobject-1-0-0.120-2.1.aarch64",
                  "product_id": "libpolkit-gobject-1-0-0.120-2.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit-gobject-1-0-32bit-0.120-2.1.aarch64",
                "product": {
                  "name": "libpolkit-gobject-1-0-32bit-0.120-2.1.aarch64",
                  "product_id": "libpolkit-gobject-1-0-32bit-0.120-2.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.120-2.1.aarch64",
                "product": {
                  "name": "polkit-0.120-2.1.aarch64",
                  "product_id": "polkit-0.120-2.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.120-2.1.aarch64",
                "product": {
                  "name": "polkit-devel-0.120-2.1.aarch64",
                  "product_id": "polkit-devel-0.120-2.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-doc-0.120-2.1.aarch64",
                "product": {
                  "name": "polkit-doc-0.120-2.1.aarch64",
                  "product_id": "polkit-doc-0.120-2.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.120-2.1.aarch64",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.120-2.1.aarch64",
                  "product_id": "typelib-1_0-Polkit-1_0-0.120-2.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit-agent-1-0-0.120-2.1.ppc64le",
                "product": {
                  "name": "libpolkit-agent-1-0-0.120-2.1.ppc64le",
                  "product_id": "libpolkit-agent-1-0-0.120-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit-agent-1-0-32bit-0.120-2.1.ppc64le",
                "product": {
                  "name": "libpolkit-agent-1-0-32bit-0.120-2.1.ppc64le",
                  "product_id": "libpolkit-agent-1-0-32bit-0.120-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit-gobject-1-0-0.120-2.1.ppc64le",
                "product": {
                  "name": "libpolkit-gobject-1-0-0.120-2.1.ppc64le",
                  "product_id": "libpolkit-gobject-1-0-0.120-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit-gobject-1-0-32bit-0.120-2.1.ppc64le",
                "product": {
                  "name": "libpolkit-gobject-1-0-32bit-0.120-2.1.ppc64le",
                  "product_id": "libpolkit-gobject-1-0-32bit-0.120-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.120-2.1.ppc64le",
                "product": {
                  "name": "polkit-0.120-2.1.ppc64le",
                  "product_id": "polkit-0.120-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.120-2.1.ppc64le",
                "product": {
                  "name": "polkit-devel-0.120-2.1.ppc64le",
                  "product_id": "polkit-devel-0.120-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-doc-0.120-2.1.ppc64le",
                "product": {
                  "name": "polkit-doc-0.120-2.1.ppc64le",
                  "product_id": "polkit-doc-0.120-2.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.120-2.1.ppc64le",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.120-2.1.ppc64le",
                  "product_id": "typelib-1_0-Polkit-1_0-0.120-2.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit-agent-1-0-0.120-2.1.s390x",
                "product": {
                  "name": "libpolkit-agent-1-0-0.120-2.1.s390x",
                  "product_id": "libpolkit-agent-1-0-0.120-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit-agent-1-0-32bit-0.120-2.1.s390x",
                "product": {
                  "name": "libpolkit-agent-1-0-32bit-0.120-2.1.s390x",
                  "product_id": "libpolkit-agent-1-0-32bit-0.120-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit-gobject-1-0-0.120-2.1.s390x",
                "product": {
                  "name": "libpolkit-gobject-1-0-0.120-2.1.s390x",
                  "product_id": "libpolkit-gobject-1-0-0.120-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit-gobject-1-0-32bit-0.120-2.1.s390x",
                "product": {
                  "name": "libpolkit-gobject-1-0-32bit-0.120-2.1.s390x",
                  "product_id": "libpolkit-gobject-1-0-32bit-0.120-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.120-2.1.s390x",
                "product": {
                  "name": "polkit-0.120-2.1.s390x",
                  "product_id": "polkit-0.120-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.120-2.1.s390x",
                "product": {
                  "name": "polkit-devel-0.120-2.1.s390x",
                  "product_id": "polkit-devel-0.120-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-doc-0.120-2.1.s390x",
                "product": {
                  "name": "polkit-doc-0.120-2.1.s390x",
                  "product_id": "polkit-doc-0.120-2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.120-2.1.s390x",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.120-2.1.s390x",
                  "product_id": "typelib-1_0-Polkit-1_0-0.120-2.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit-agent-1-0-0.120-2.1.x86_64",
                "product": {
                  "name": "libpolkit-agent-1-0-0.120-2.1.x86_64",
                  "product_id": "libpolkit-agent-1-0-0.120-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit-agent-1-0-32bit-0.120-2.1.x86_64",
                "product": {
                  "name": "libpolkit-agent-1-0-32bit-0.120-2.1.x86_64",
                  "product_id": "libpolkit-agent-1-0-32bit-0.120-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit-gobject-1-0-0.120-2.1.x86_64",
                "product": {
                  "name": "libpolkit-gobject-1-0-0.120-2.1.x86_64",
                  "product_id": "libpolkit-gobject-1-0-0.120-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit-gobject-1-0-32bit-0.120-2.1.x86_64",
                "product": {
                  "name": "libpolkit-gobject-1-0-32bit-0.120-2.1.x86_64",
                  "product_id": "libpolkit-gobject-1-0-32bit-0.120-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.120-2.1.x86_64",
                "product": {
                  "name": "polkit-0.120-2.1.x86_64",
                  "product_id": "polkit-0.120-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.120-2.1.x86_64",
                "product": {
                  "name": "polkit-devel-0.120-2.1.x86_64",
                  "product_id": "polkit-devel-0.120-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-doc-0.120-2.1.x86_64",
                "product": {
                  "name": "polkit-doc-0.120-2.1.x86_64",
                  "product_id": "polkit-doc-0.120-2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.120-2.1.x86_64",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.120-2.1.x86_64",
                  "product_id": "typelib-1_0-Polkit-1_0-0.120-2.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit-agent-1-0-0.120-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libpolkit-agent-1-0-0.120-2.1.aarch64"
        },
        "product_reference": "libpolkit-agent-1-0-0.120-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit-agent-1-0-0.120-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libpolkit-agent-1-0-0.120-2.1.ppc64le"
        },
        "product_reference": "libpolkit-agent-1-0-0.120-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit-agent-1-0-0.120-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libpolkit-agent-1-0-0.120-2.1.s390x"
        },
        "product_reference": "libpolkit-agent-1-0-0.120-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit-agent-1-0-0.120-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libpolkit-agent-1-0-0.120-2.1.x86_64"
        },
        "product_reference": "libpolkit-agent-1-0-0.120-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit-agent-1-0-32bit-0.120-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libpolkit-agent-1-0-32bit-0.120-2.1.aarch64"
        },
        "product_reference": "libpolkit-agent-1-0-32bit-0.120-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit-agent-1-0-32bit-0.120-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libpolkit-agent-1-0-32bit-0.120-2.1.ppc64le"
        },
        "product_reference": "libpolkit-agent-1-0-32bit-0.120-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit-agent-1-0-32bit-0.120-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libpolkit-agent-1-0-32bit-0.120-2.1.s390x"
        },
        "product_reference": "libpolkit-agent-1-0-32bit-0.120-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit-agent-1-0-32bit-0.120-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libpolkit-agent-1-0-32bit-0.120-2.1.x86_64"
        },
        "product_reference": "libpolkit-agent-1-0-32bit-0.120-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit-gobject-1-0-0.120-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libpolkit-gobject-1-0-0.120-2.1.aarch64"
        },
        "product_reference": "libpolkit-gobject-1-0-0.120-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit-gobject-1-0-0.120-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libpolkit-gobject-1-0-0.120-2.1.ppc64le"
        },
        "product_reference": "libpolkit-gobject-1-0-0.120-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit-gobject-1-0-0.120-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libpolkit-gobject-1-0-0.120-2.1.s390x"
        },
        "product_reference": "libpolkit-gobject-1-0-0.120-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit-gobject-1-0-0.120-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libpolkit-gobject-1-0-0.120-2.1.x86_64"
        },
        "product_reference": "libpolkit-gobject-1-0-0.120-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit-gobject-1-0-32bit-0.120-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libpolkit-gobject-1-0-32bit-0.120-2.1.aarch64"
        },
        "product_reference": "libpolkit-gobject-1-0-32bit-0.120-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit-gobject-1-0-32bit-0.120-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libpolkit-gobject-1-0-32bit-0.120-2.1.ppc64le"
        },
        "product_reference": "libpolkit-gobject-1-0-32bit-0.120-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit-gobject-1-0-32bit-0.120-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libpolkit-gobject-1-0-32bit-0.120-2.1.s390x"
        },
        "product_reference": "libpolkit-gobject-1-0-32bit-0.120-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit-gobject-1-0-32bit-0.120-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libpolkit-gobject-1-0-32bit-0.120-2.1.x86_64"
        },
        "product_reference": "libpolkit-gobject-1-0-32bit-0.120-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.120-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:polkit-0.120-2.1.aarch64"
        },
        "product_reference": "polkit-0.120-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.120-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:polkit-0.120-2.1.ppc64le"
        },
        "product_reference": "polkit-0.120-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.120-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:polkit-0.120-2.1.s390x"
        },
        "product_reference": "polkit-0.120-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.120-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:polkit-0.120-2.1.x86_64"
        },
        "product_reference": "polkit-0.120-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.120-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:polkit-devel-0.120-2.1.aarch64"
        },
        "product_reference": "polkit-devel-0.120-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.120-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:polkit-devel-0.120-2.1.ppc64le"
        },
        "product_reference": "polkit-devel-0.120-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.120-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:polkit-devel-0.120-2.1.s390x"
        },
        "product_reference": "polkit-devel-0.120-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.120-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:polkit-devel-0.120-2.1.x86_64"
        },
        "product_reference": "polkit-devel-0.120-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-doc-0.120-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:polkit-doc-0.120-2.1.aarch64"
        },
        "product_reference": "polkit-doc-0.120-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-doc-0.120-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:polkit-doc-0.120-2.1.ppc64le"
        },
        "product_reference": "polkit-doc-0.120-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-doc-0.120-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:polkit-doc-0.120-2.1.s390x"
        },
        "product_reference": "polkit-doc-0.120-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-doc-0.120-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:polkit-doc-0.120-2.1.x86_64"
        },
        "product_reference": "polkit-doc-0.120-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.120-2.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.120-2.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.120-2.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.120-2.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.120-2.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.120-2.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.120-2.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.120-2.1.s390x"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.120-2.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.120-2.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.120-2.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.120-2.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-4034",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4034"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:libpolkit-agent-1-0-0.120-2.1.aarch64",
          "openSUSE Tumbleweed:libpolkit-agent-1-0-0.120-2.1.ppc64le",
          "openSUSE Tumbleweed:libpolkit-agent-1-0-0.120-2.1.s390x",
          "openSUSE Tumbleweed:libpolkit-agent-1-0-0.120-2.1.x86_64",
          "openSUSE Tumbleweed:libpolkit-agent-1-0-32bit-0.120-2.1.aarch64",
          "openSUSE Tumbleweed:libpolkit-agent-1-0-32bit-0.120-2.1.ppc64le",
          "openSUSE Tumbleweed:libpolkit-agent-1-0-32bit-0.120-2.1.s390x",
          "openSUSE Tumbleweed:libpolkit-agent-1-0-32bit-0.120-2.1.x86_64",
          "openSUSE Tumbleweed:libpolkit-gobject-1-0-0.120-2.1.aarch64",
          "openSUSE Tumbleweed:libpolkit-gobject-1-0-0.120-2.1.ppc64le",
          "openSUSE Tumbleweed:libpolkit-gobject-1-0-0.120-2.1.s390x",
          "openSUSE Tumbleweed:libpolkit-gobject-1-0-0.120-2.1.x86_64",
          "openSUSE Tumbleweed:libpolkit-gobject-1-0-32bit-0.120-2.1.aarch64",
          "openSUSE Tumbleweed:libpolkit-gobject-1-0-32bit-0.120-2.1.ppc64le",
          "openSUSE Tumbleweed:libpolkit-gobject-1-0-32bit-0.120-2.1.s390x",
          "openSUSE Tumbleweed:libpolkit-gobject-1-0-32bit-0.120-2.1.x86_64",
          "openSUSE Tumbleweed:polkit-0.120-2.1.aarch64",
          "openSUSE Tumbleweed:polkit-0.120-2.1.ppc64le",
          "openSUSE Tumbleweed:polkit-0.120-2.1.s390x",
          "openSUSE Tumbleweed:polkit-0.120-2.1.x86_64",
          "openSUSE Tumbleweed:polkit-devel-0.120-2.1.aarch64",
          "openSUSE Tumbleweed:polkit-devel-0.120-2.1.ppc64le",
          "openSUSE Tumbleweed:polkit-devel-0.120-2.1.s390x",
          "openSUSE Tumbleweed:polkit-devel-0.120-2.1.x86_64",
          "openSUSE Tumbleweed:polkit-doc-0.120-2.1.aarch64",
          "openSUSE Tumbleweed:polkit-doc-0.120-2.1.ppc64le",
          "openSUSE Tumbleweed:polkit-doc-0.120-2.1.s390x",
          "openSUSE Tumbleweed:polkit-doc-0.120-2.1.x86_64",
          "openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.120-2.1.aarch64",
          "openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.120-2.1.ppc64le",
          "openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.120-2.1.s390x",
          "openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.120-2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4034",
          "url": "https://www.suse.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194568 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1194568"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195125 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195125"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195136 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195136"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195246 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195246"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195265 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195265"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195278 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195278"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195528 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195528"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195541 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195541"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196165 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1196165"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196388 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1196388"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225668 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1225668"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:libpolkit-agent-1-0-0.120-2.1.aarch64",
            "openSUSE Tumbleweed:libpolkit-agent-1-0-0.120-2.1.ppc64le",
            "openSUSE Tumbleweed:libpolkit-agent-1-0-0.120-2.1.s390x",
            "openSUSE Tumbleweed:libpolkit-agent-1-0-0.120-2.1.x86_64",
            "openSUSE Tumbleweed:libpolkit-agent-1-0-32bit-0.120-2.1.aarch64",
            "openSUSE Tumbleweed:libpolkit-agent-1-0-32bit-0.120-2.1.ppc64le",
            "openSUSE Tumbleweed:libpolkit-agent-1-0-32bit-0.120-2.1.s390x",
            "openSUSE Tumbleweed:libpolkit-agent-1-0-32bit-0.120-2.1.x86_64",
            "openSUSE Tumbleweed:libpolkit-gobject-1-0-0.120-2.1.aarch64",
            "openSUSE Tumbleweed:libpolkit-gobject-1-0-0.120-2.1.ppc64le",
            "openSUSE Tumbleweed:libpolkit-gobject-1-0-0.120-2.1.s390x",
            "openSUSE Tumbleweed:libpolkit-gobject-1-0-0.120-2.1.x86_64",
            "openSUSE Tumbleweed:libpolkit-gobject-1-0-32bit-0.120-2.1.aarch64",
            "openSUSE Tumbleweed:libpolkit-gobject-1-0-32bit-0.120-2.1.ppc64le",
            "openSUSE Tumbleweed:libpolkit-gobject-1-0-32bit-0.120-2.1.s390x",
            "openSUSE Tumbleweed:libpolkit-gobject-1-0-32bit-0.120-2.1.x86_64",
            "openSUSE Tumbleweed:polkit-0.120-2.1.aarch64",
            "openSUSE Tumbleweed:polkit-0.120-2.1.ppc64le",
            "openSUSE Tumbleweed:polkit-0.120-2.1.s390x",
            "openSUSE Tumbleweed:polkit-0.120-2.1.x86_64",
            "openSUSE Tumbleweed:polkit-devel-0.120-2.1.aarch64",
            "openSUSE Tumbleweed:polkit-devel-0.120-2.1.ppc64le",
            "openSUSE Tumbleweed:polkit-devel-0.120-2.1.s390x",
            "openSUSE Tumbleweed:polkit-devel-0.120-2.1.x86_64",
            "openSUSE Tumbleweed:polkit-doc-0.120-2.1.aarch64",
            "openSUSE Tumbleweed:polkit-doc-0.120-2.1.ppc64le",
            "openSUSE Tumbleweed:polkit-doc-0.120-2.1.s390x",
            "openSUSE Tumbleweed:polkit-doc-0.120-2.1.x86_64",
            "openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.120-2.1.aarch64",
            "openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.120-2.1.ppc64le",
            "openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.120-2.1.s390x",
            "openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.120-2.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:libpolkit-agent-1-0-0.120-2.1.aarch64",
            "openSUSE Tumbleweed:libpolkit-agent-1-0-0.120-2.1.ppc64le",
            "openSUSE Tumbleweed:libpolkit-agent-1-0-0.120-2.1.s390x",
            "openSUSE Tumbleweed:libpolkit-agent-1-0-0.120-2.1.x86_64",
            "openSUSE Tumbleweed:libpolkit-agent-1-0-32bit-0.120-2.1.aarch64",
            "openSUSE Tumbleweed:libpolkit-agent-1-0-32bit-0.120-2.1.ppc64le",
            "openSUSE Tumbleweed:libpolkit-agent-1-0-32bit-0.120-2.1.s390x",
            "openSUSE Tumbleweed:libpolkit-agent-1-0-32bit-0.120-2.1.x86_64",
            "openSUSE Tumbleweed:libpolkit-gobject-1-0-0.120-2.1.aarch64",
            "openSUSE Tumbleweed:libpolkit-gobject-1-0-0.120-2.1.ppc64le",
            "openSUSE Tumbleweed:libpolkit-gobject-1-0-0.120-2.1.s390x",
            "openSUSE Tumbleweed:libpolkit-gobject-1-0-0.120-2.1.x86_64",
            "openSUSE Tumbleweed:libpolkit-gobject-1-0-32bit-0.120-2.1.aarch64",
            "openSUSE Tumbleweed:libpolkit-gobject-1-0-32bit-0.120-2.1.ppc64le",
            "openSUSE Tumbleweed:libpolkit-gobject-1-0-32bit-0.120-2.1.s390x",
            "openSUSE Tumbleweed:libpolkit-gobject-1-0-32bit-0.120-2.1.x86_64",
            "openSUSE Tumbleweed:polkit-0.120-2.1.aarch64",
            "openSUSE Tumbleweed:polkit-0.120-2.1.ppc64le",
            "openSUSE Tumbleweed:polkit-0.120-2.1.s390x",
            "openSUSE Tumbleweed:polkit-0.120-2.1.x86_64",
            "openSUSE Tumbleweed:polkit-devel-0.120-2.1.aarch64",
            "openSUSE Tumbleweed:polkit-devel-0.120-2.1.ppc64le",
            "openSUSE Tumbleweed:polkit-devel-0.120-2.1.s390x",
            "openSUSE Tumbleweed:polkit-devel-0.120-2.1.x86_64",
            "openSUSE Tumbleweed:polkit-doc-0.120-2.1.aarch64",
            "openSUSE Tumbleweed:polkit-doc-0.120-2.1.ppc64le",
            "openSUSE Tumbleweed:polkit-doc-0.120-2.1.s390x",
            "openSUSE Tumbleweed:polkit-doc-0.120-2.1.x86_64",
            "openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.120-2.1.aarch64",
            "openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.120-2.1.ppc64le",
            "openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.120-2.1.s390x",
            "openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.120-2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4034"
    }
  ]
}
  suse-su-2022:0191-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for polkit",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for polkit fixes the following issues:\n\n- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2022-191,SUSE-SLE-Product-HPC-15-2022-191,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-191,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-191,SUSE-SLE-Product-SLES-15-2022-191,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-191,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-191,SUSE-SLE-Product-SLES_SAP-15-2022-191,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-191,SUSE-Storage-6-2022-191",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0191-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2022:0191-1",
        "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220191-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2022:0191-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010075.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194568",
        "url": "https://bugzilla.suse.com/1194568"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4034 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4034/"
      }
    ],
    "title": "Security update for polkit",
    "tracking": {
      "current_release_date": "2022-01-25T18:11:23Z",
      "generator": {
        "date": "2022-01-25T18:11:23Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2022:0191-1",
      "initial_release_date": "2022-01-25T18:11:23Z",
      "revision_history": [
        {
          "date": "2022-01-25T18:11:23Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.114-3.15.1.aarch64",
                "product": {
                  "name": "libpolkit0-0.114-3.15.1.aarch64",
                  "product_id": "libpolkit0-0.114-3.15.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.114-3.15.1.aarch64",
                "product": {
                  "name": "polkit-0.114-3.15.1.aarch64",
                  "product_id": "polkit-0.114-3.15.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.114-3.15.1.aarch64",
                "product": {
                  "name": "polkit-devel-0.114-3.15.1.aarch64",
                  "product_id": "polkit-devel-0.114-3.15.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
                  "product_id": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-64bit-0.114-3.15.1.aarch64_ilp32",
                "product": {
                  "name": "libpolkit0-64bit-0.114-3.15.1.aarch64_ilp32",
                  "product_id": "libpolkit0-64bit-0.114-3.15.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.114-3.15.1.i586",
                "product": {
                  "name": "libpolkit0-0.114-3.15.1.i586",
                  "product_id": "libpolkit0-0.114-3.15.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.114-3.15.1.i586",
                "product": {
                  "name": "polkit-0.114-3.15.1.i586",
                  "product_id": "polkit-0.114-3.15.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.114-3.15.1.i586",
                "product": {
                  "name": "polkit-devel-0.114-3.15.1.i586",
                  "product_id": "polkit-devel-0.114-3.15.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.i586",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.i586",
                  "product_id": "typelib-1_0-Polkit-1_0-0.114-3.15.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-doc-0.114-3.15.1.noarch",
                "product": {
                  "name": "polkit-doc-0.114-3.15.1.noarch",
                  "product_id": "polkit-doc-0.114-3.15.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.114-3.15.1.ppc64le",
                "product": {
                  "name": "libpolkit0-0.114-3.15.1.ppc64le",
                  "product_id": "libpolkit0-0.114-3.15.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.114-3.15.1.ppc64le",
                "product": {
                  "name": "polkit-0.114-3.15.1.ppc64le",
                  "product_id": "polkit-0.114-3.15.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.114-3.15.1.ppc64le",
                "product": {
                  "name": "polkit-devel-0.114-3.15.1.ppc64le",
                  "product_id": "polkit-devel-0.114-3.15.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
                  "product_id": "typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.114-3.15.1.s390x",
                "product": {
                  "name": "libpolkit0-0.114-3.15.1.s390x",
                  "product_id": "libpolkit0-0.114-3.15.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.114-3.15.1.s390x",
                "product": {
                  "name": "polkit-0.114-3.15.1.s390x",
                  "product_id": "polkit-0.114-3.15.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.114-3.15.1.s390x",
                "product": {
                  "name": "polkit-devel-0.114-3.15.1.s390x",
                  "product_id": "polkit-devel-0.114-3.15.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.s390x",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.s390x",
                  "product_id": "typelib-1_0-Polkit-1_0-0.114-3.15.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.114-3.15.1.x86_64",
                "product": {
                  "name": "libpolkit0-0.114-3.15.1.x86_64",
                  "product_id": "libpolkit0-0.114-3.15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit0-32bit-0.114-3.15.1.x86_64",
                "product": {
                  "name": "libpolkit0-32bit-0.114-3.15.1.x86_64",
                  "product_id": "libpolkit0-32bit-0.114-3.15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.114-3.15.1.x86_64",
                "product": {
                  "name": "polkit-0.114-3.15.1.x86_64",
                  "product_id": "polkit-0.114-3.15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.114-3.15.1.x86_64",
                "product": {
                  "name": "polkit-devel-0.114-3.15.1.x86_64",
                  "product_id": "polkit-devel-0.114-3.15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
                  "product_id": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP1-BCL",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP1-BCL",
                  "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_bcl:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Enterprise Storage 6",
                "product": {
                  "name": "SUSE Enterprise Storage 6",
                  "product_id": "SUSE Enterprise Storage 6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:ses:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:libpolkit0-0.114-3.15.1.aarch64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:libpolkit0-0.114-3.15.1.x86_64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:polkit-0.114-3.15.1.aarch64"
        },
        "product_reference": "polkit-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:polkit-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:polkit-devel-0.114-3.15.1.aarch64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:polkit-devel-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:libpolkit0-0.114-3.15.1.aarch64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:libpolkit0-0.114-3.15.1.x86_64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:polkit-0.114-3.15.1.aarch64"
        },
        "product_reference": "polkit-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:polkit-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:polkit-devel-0.114-3.15.1.aarch64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:polkit-devel-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libpolkit0-0.114-3.15.1.aarch64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libpolkit0-0.114-3.15.1.x86_64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:polkit-0.114-3.15.1.aarch64"
        },
        "product_reference": "polkit-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:polkit-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:polkit-devel-0.114-3.15.1.aarch64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:polkit-devel-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libpolkit0-0.114-3.15.1.aarch64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libpolkit0-0.114-3.15.1.x86_64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:polkit-0.114-3.15.1.aarch64"
        },
        "product_reference": "polkit-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:polkit-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:polkit-devel-0.114-3.15.1.aarch64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:polkit-devel-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:libpolkit0-0.114-3.15.1.aarch64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:libpolkit0-0.114-3.15.1.ppc64le"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:libpolkit0-0.114-3.15.1.s390x"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:libpolkit0-0.114-3.15.1.x86_64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:polkit-0.114-3.15.1.aarch64"
        },
        "product_reference": "polkit-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:polkit-0.114-3.15.1.ppc64le"
        },
        "product_reference": "polkit-0.114-3.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:polkit-0.114-3.15.1.s390x"
        },
        "product_reference": "polkit-0.114-3.15.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:polkit-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:polkit-devel-0.114-3.15.1.aarch64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:polkit-devel-0.114-3.15.1.ppc64le"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:polkit-devel-0.114-3.15.1.s390x"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:polkit-devel-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.s390x"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:libpolkit0-0.114-3.15.1.x86_64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:polkit-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:polkit-devel-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libpolkit0-0.114-3.15.1.aarch64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libpolkit0-0.114-3.15.1.ppc64le"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libpolkit0-0.114-3.15.1.s390x"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:libpolkit0-0.114-3.15.1.x86_64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-0.114-3.15.1.aarch64"
        },
        "product_reference": "polkit-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-0.114-3.15.1.ppc64le"
        },
        "product_reference": "polkit-0.114-3.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-0.114-3.15.1.s390x"
        },
        "product_reference": "polkit-0.114-3.15.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-devel-0.114-3.15.1.aarch64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-devel-0.114-3.15.1.ppc64le"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-devel-0.114-3.15.1.s390x"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-devel-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.s390x"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:libpolkit0-0.114-3.15.1.ppc64le"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:libpolkit0-0.114-3.15.1.x86_64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:polkit-0.114-3.15.1.ppc64le"
        },
        "product_reference": "polkit-0.114-3.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:polkit-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:polkit-devel-0.114-3.15.1.ppc64le"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:polkit-devel-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libpolkit0-0.114-3.15.1.ppc64le"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libpolkit0-0.114-3.15.1.x86_64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:polkit-0.114-3.15.1.ppc64le"
        },
        "product_reference": "polkit-0.114-3.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:polkit-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:polkit-devel-0.114-3.15.1.ppc64le"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:polkit-devel-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.aarch64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:libpolkit0-0.114-3.15.1.aarch64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.114-3.15.1.x86_64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:libpolkit0-0.114-3.15.1.x86_64"
        },
        "product_reference": "libpolkit0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.aarch64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:polkit-0.114-3.15.1.aarch64"
        },
        "product_reference": "polkit-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.114-3.15.1.x86_64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:polkit-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.aarch64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:polkit-devel-0.114-3.15.1.aarch64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.114-3.15.1.x86_64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:polkit-devel-0.114-3.15.1.x86_64"
        },
        "product_reference": "polkit-devel-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64 as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-4034",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4034"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:libpolkit0-0.114-3.15.1.aarch64",
          "SUSE Enterprise Storage 6:libpolkit0-0.114-3.15.1.x86_64",
          "SUSE Enterprise Storage 6:polkit-0.114-3.15.1.aarch64",
          "SUSE Enterprise Storage 6:polkit-0.114-3.15.1.x86_64",
          "SUSE Enterprise Storage 6:polkit-devel-0.114-3.15.1.aarch64",
          "SUSE Enterprise Storage 6:polkit-devel-0.114-3.15.1.x86_64",
          "SUSE Enterprise Storage 6:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
          "SUSE Enterprise Storage 6:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libpolkit0-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libpolkit0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:polkit-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:polkit-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:polkit-devel-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:polkit-devel-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libpolkit0-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libpolkit0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:polkit-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:polkit-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:polkit-devel-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:polkit-devel-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:libpolkit0-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:libpolkit0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:polkit-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:polkit-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:polkit-devel-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:polkit-devel-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:libpolkit0-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:libpolkit0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:polkit-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:polkit-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:polkit-devel-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:polkit-devel-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:libpolkit0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:polkit-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:polkit-devel-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-BCL:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:libpolkit0-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:libpolkit0-0.114-3.15.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:libpolkit0-0.114-3.15.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:libpolkit0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-0.114-3.15.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-0.114-3.15.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-devel-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-devel-0.114-3.15.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-devel-0.114-3.15.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-devel-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.s390x",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:libpolkit0-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:libpolkit0-0.114-3.15.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:libpolkit0-0.114-3.15.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:libpolkit0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:polkit-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:polkit-0.114-3.15.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:polkit-0.114-3.15.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:polkit-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:polkit-devel-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:polkit-devel-0.114-3.15.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:polkit-devel-0.114-3.15.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:polkit-devel-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libpolkit0-0.114-3.15.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libpolkit0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:polkit-0.114-3.15.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:polkit-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:polkit-devel-0.114-3.15.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:polkit-devel-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:libpolkit0-0.114-3.15.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:libpolkit0-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:polkit-0.114-3.15.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:polkit-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:polkit-devel-0.114-3.15.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:polkit-devel-0.114-3.15.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4034",
          "url": "https://www.suse.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194568 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1194568"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195125 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195125"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195136 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195136"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195246 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195246"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195265 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195265"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195278 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195278"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195528 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195528"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195541 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195541"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196165 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1196165"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196388 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1196388"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225668 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1225668"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:libpolkit0-0.114-3.15.1.aarch64",
            "SUSE Enterprise Storage 6:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Enterprise Storage 6:polkit-0.114-3.15.1.aarch64",
            "SUSE Enterprise Storage 6:polkit-0.114-3.15.1.x86_64",
            "SUSE Enterprise Storage 6:polkit-devel-0.114-3.15.1.aarch64",
            "SUSE Enterprise Storage 6:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Enterprise Storage 6:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
            "SUSE Enterprise Storage 6:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libpolkit0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:polkit-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:polkit-devel-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libpolkit0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:polkit-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:polkit-devel-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:libpolkit0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:polkit-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:polkit-devel-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:libpolkit0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:polkit-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:polkit-devel-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:libpolkit0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:libpolkit0-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:libpolkit0-0.114-3.15.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-0.114-3.15.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-devel-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-devel-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-devel-0.114-3.15.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:libpolkit0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:libpolkit0-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:libpolkit0-0.114-3.15.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:polkit-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:polkit-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:polkit-0.114-3.15.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:polkit-devel-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:polkit-devel-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:polkit-devel-0.114-3.15.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libpolkit0-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:polkit-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:polkit-devel-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:libpolkit0-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:polkit-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:polkit-devel-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:libpolkit0-0.114-3.15.1.aarch64",
            "SUSE Enterprise Storage 6:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Enterprise Storage 6:polkit-0.114-3.15.1.aarch64",
            "SUSE Enterprise Storage 6:polkit-0.114-3.15.1.x86_64",
            "SUSE Enterprise Storage 6:polkit-devel-0.114-3.15.1.aarch64",
            "SUSE Enterprise Storage 6:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Enterprise Storage 6:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
            "SUSE Enterprise Storage 6:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libpolkit0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:polkit-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:polkit-devel-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libpolkit0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:polkit-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:polkit-devel-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:libpolkit0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:polkit-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:polkit-devel-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:libpolkit0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:polkit-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:polkit-devel-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-BCL:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:libpolkit0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:libpolkit0-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:libpolkit0-0.114-3.15.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-0.114-3.15.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-devel-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-devel-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-devel-0.114-3.15.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.s390x",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:libpolkit0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:libpolkit0-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:libpolkit0-0.114-3.15.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:polkit-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:polkit-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:polkit-0.114-3.15.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:polkit-devel-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:polkit-devel-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:polkit-devel-0.114-3.15.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libpolkit0-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:polkit-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:polkit-devel-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:libpolkit0-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:libpolkit0-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:polkit-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:polkit-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:polkit-devel-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:polkit-devel-0.114-3.15.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:typelib-1_0-Polkit-1_0-0.114-3.15.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:typelib-1_0-Polkit-1_0-0.114-3.15.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-01-25T18:11:23Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4034"
    }
  ]
}
  suse-su-2022:0190-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for polkit",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for polkit fixes the following issues:\n\n- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2022-190,SUSE-SLE-Module-Basesystem-15-SP3-2022-190,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-190,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-190,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-190,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-190,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-190,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-190,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-190,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-190,SUSE-SUSE-MicroOS-5.0-2022-190,SUSE-SUSE-MicroOS-5.1-2022-190,SUSE-Storage-7-2022-190",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0190-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2022:0190-1",
        "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220190-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2022:0190-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2022-January/021462.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194568",
        "url": "https://bugzilla.suse.com/1194568"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4034 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4034/"
      }
    ],
    "title": "Security update for polkit",
    "tracking": {
      "current_release_date": "2022-01-25T18:10:47Z",
      "generator": {
        "date": "2022-01-25T18:10:47Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2022:0190-1",
      "initial_release_date": "2022-01-25T18:10:47Z",
      "revision_history": [
        {
          "date": "2022-01-25T18:10:47Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.116-3.6.1.aarch64",
                "product": {
                  "name": "libpolkit0-0.116-3.6.1.aarch64",
                  "product_id": "libpolkit0-0.116-3.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.116-3.6.1.aarch64",
                "product": {
                  "name": "polkit-0.116-3.6.1.aarch64",
                  "product_id": "polkit-0.116-3.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.116-3.6.1.aarch64",
                "product": {
                  "name": "polkit-devel-0.116-3.6.1.aarch64",
                  "product_id": "polkit-devel-0.116-3.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
                  "product_id": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-64bit-0.116-3.6.1.aarch64_ilp32",
                "product": {
                  "name": "libpolkit0-64bit-0.116-3.6.1.aarch64_ilp32",
                  "product_id": "libpolkit0-64bit-0.116-3.6.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.116-3.6.1.i586",
                "product": {
                  "name": "libpolkit0-0.116-3.6.1.i586",
                  "product_id": "libpolkit0-0.116-3.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.116-3.6.1.i586",
                "product": {
                  "name": "polkit-0.116-3.6.1.i586",
                  "product_id": "polkit-0.116-3.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.116-3.6.1.i586",
                "product": {
                  "name": "polkit-devel-0.116-3.6.1.i586",
                  "product_id": "polkit-devel-0.116-3.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.i586",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.i586",
                  "product_id": "typelib-1_0-Polkit-1_0-0.116-3.6.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-doc-0.116-3.6.1.noarch",
                "product": {
                  "name": "polkit-doc-0.116-3.6.1.noarch",
                  "product_id": "polkit-doc-0.116-3.6.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.116-3.6.1.ppc64le",
                "product": {
                  "name": "libpolkit0-0.116-3.6.1.ppc64le",
                  "product_id": "libpolkit0-0.116-3.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.116-3.6.1.ppc64le",
                "product": {
                  "name": "polkit-0.116-3.6.1.ppc64le",
                  "product_id": "polkit-0.116-3.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.116-3.6.1.ppc64le",
                "product": {
                  "name": "polkit-devel-0.116-3.6.1.ppc64le",
                  "product_id": "polkit-devel-0.116-3.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
                  "product_id": "typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.116-3.6.1.s390x",
                "product": {
                  "name": "libpolkit0-0.116-3.6.1.s390x",
                  "product_id": "libpolkit0-0.116-3.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.116-3.6.1.s390x",
                "product": {
                  "name": "polkit-0.116-3.6.1.s390x",
                  "product_id": "polkit-0.116-3.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.116-3.6.1.s390x",
                "product": {
                  "name": "polkit-devel-0.116-3.6.1.s390x",
                  "product_id": "polkit-devel-0.116-3.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
                  "product_id": "typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.116-3.6.1.x86_64",
                "product": {
                  "name": "libpolkit0-0.116-3.6.1.x86_64",
                  "product_id": "libpolkit0-0.116-3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit0-32bit-0.116-3.6.1.x86_64",
                "product": {
                  "name": "libpolkit0-32bit-0.116-3.6.1.x86_64",
                  "product_id": "libpolkit0-32bit-0.116-3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.116-3.6.1.x86_64",
                "product": {
                  "name": "polkit-0.116-3.6.1.x86_64",
                  "product_id": "polkit-0.116-3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.116-3.6.1.x86_64",
                "product": {
                  "name": "polkit-devel-0.116-3.6.1.x86_64",
                  "product_id": "polkit-devel-0.116-3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
                  "product_id": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP2-BCL",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP2-BCL",
                  "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_bcl:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Proxy 4.1",
                "product": {
                  "name": "SUSE Manager Proxy 4.1",
                  "product_id": "SUSE Manager Proxy 4.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-proxy:4.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Retail Branch Server 4.1",
                "product": {
                  "name": "SUSE Manager Retail Branch Server 4.1",
                  "product_id": "SUSE Manager Retail Branch Server 4.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Server 4.1",
                "product": {
                  "name": "SUSE Manager Server 4.1",
                  "product_id": "SUSE Manager Server 4.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-server:4.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.0",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.0",
                  "product_id": "SUSE Linux Enterprise Micro 5.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.0"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.1",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.1",
                  "product_id": "SUSE Linux Enterprise Micro 5.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Enterprise Storage 7",
                "product": {
                  "name": "SUSE Enterprise Storage 7",
                  "product_id": "SUSE Enterprise Storage 7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:ses:7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpolkit0-0.116-3.6.1.aarch64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpolkit0-0.116-3.6.1.ppc64le"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpolkit0-0.116-3.6.1.s390x"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpolkit0-0.116-3.6.1.x86_64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-0.116-3.6.1.aarch64"
        },
        "product_reference": "polkit-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-0.116-3.6.1.ppc64le"
        },
        "product_reference": "polkit-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-0.116-3.6.1.s390x"
        },
        "product_reference": "polkit-0.116-3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-devel-0.116-3.6.1.aarch64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-devel-0.116-3.6.1.ppc64le"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-devel-0.116-3.6.1.s390x"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-devel-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libpolkit0-0.116-3.6.1.aarch64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libpolkit0-0.116-3.6.1.x86_64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:polkit-0.116-3.6.1.aarch64"
        },
        "product_reference": "polkit-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:polkit-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:polkit-devel-0.116-3.6.1.aarch64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:polkit-devel-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libpolkit0-0.116-3.6.1.aarch64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libpolkit0-0.116-3.6.1.x86_64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:polkit-0.116-3.6.1.aarch64"
        },
        "product_reference": "polkit-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:polkit-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:polkit-devel-0.116-3.6.1.aarch64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:polkit-devel-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:libpolkit0-0.116-3.6.1.x86_64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:polkit-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:polkit-devel-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libpolkit0-0.116-3.6.1.aarch64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libpolkit0-0.116-3.6.1.ppc64le"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libpolkit0-0.116-3.6.1.s390x"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libpolkit0-0.116-3.6.1.x86_64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-0.116-3.6.1.aarch64"
        },
        "product_reference": "polkit-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-0.116-3.6.1.ppc64le"
        },
        "product_reference": "polkit-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-0.116-3.6.1.s390x"
        },
        "product_reference": "polkit-0.116-3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-devel-0.116-3.6.1.aarch64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-devel-0.116-3.6.1.ppc64le"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-devel-0.116-3.6.1.s390x"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-devel-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libpolkit0-0.116-3.6.1.ppc64le"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libpolkit0-0.116-3.6.1.x86_64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:polkit-0.116-3.6.1.ppc64le"
        },
        "product_reference": "polkit-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:polkit-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:polkit-devel-0.116-3.6.1.ppc64le"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:polkit-devel-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.x86_64 as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:libpolkit0-0.116-3.6.1.x86_64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.x86_64 as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:polkit-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.x86_64 as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:polkit-devel-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64 as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:libpolkit0-0.116-3.6.1.x86_64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:polkit-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:polkit-devel-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.ppc64le as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:libpolkit0-0.116-3.6.1.ppc64le"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.s390x as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:libpolkit0-0.116-3.6.1.s390x"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.x86_64 as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:libpolkit0-0.116-3.6.1.x86_64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.ppc64le as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:polkit-0.116-3.6.1.ppc64le"
        },
        "product_reference": "polkit-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.s390x as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:polkit-0.116-3.6.1.s390x"
        },
        "product_reference": "polkit-0.116-3.6.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.x86_64 as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:polkit-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.ppc64le as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:polkit-devel-0.116-3.6.1.ppc64le"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.s390x as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:polkit-devel-0.116-3.6.1.s390x"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.x86_64 as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:polkit-devel-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64 as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
          "product_id": "SUSE Linux Enterprise Micro 5.0:libpolkit0-0.116-3.6.1.aarch64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
          "product_id": "SUSE Linux Enterprise Micro 5.0:libpolkit0-0.116-3.6.1.x86_64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
          "product_id": "SUSE Linux Enterprise Micro 5.0:polkit-0.116-3.6.1.aarch64"
        },
        "product_reference": "polkit-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
          "product_id": "SUSE Linux Enterprise Micro 5.0:polkit-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libpolkit0-0.116-3.6.1.aarch64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libpolkit0-0.116-3.6.1.s390x"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libpolkit0-0.116-3.6.1.x86_64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:polkit-0.116-3.6.1.aarch64"
        },
        "product_reference": "polkit-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:polkit-0.116-3.6.1.s390x"
        },
        "product_reference": "polkit-0.116-3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:polkit-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.aarch64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:libpolkit0-0.116-3.6.1.aarch64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.116-3.6.1.x86_64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:libpolkit0-0.116-3.6.1.x86_64"
        },
        "product_reference": "libpolkit0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.aarch64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:polkit-0.116-3.6.1.aarch64"
        },
        "product_reference": "polkit-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.116-3.6.1.x86_64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:polkit-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.aarch64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:polkit-devel-0.116-3.6.1.aarch64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.116-3.6.1.x86_64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:polkit-devel-0.116-3.6.1.x86_64"
        },
        "product_reference": "polkit-devel-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-4034",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4034"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:libpolkit0-0.116-3.6.1.aarch64",
          "SUSE Enterprise Storage 7:libpolkit0-0.116-3.6.1.x86_64",
          "SUSE Enterprise Storage 7:polkit-0.116-3.6.1.aarch64",
          "SUSE Enterprise Storage 7:polkit-0.116-3.6.1.x86_64",
          "SUSE Enterprise Storage 7:polkit-devel-0.116-3.6.1.aarch64",
          "SUSE Enterprise Storage 7:polkit-devel-0.116-3.6.1.x86_64",
          "SUSE Enterprise Storage 7:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
          "SUSE Enterprise Storage 7:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libpolkit0-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libpolkit0-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:polkit-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:polkit-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:polkit-devel-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:polkit-devel-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libpolkit0-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libpolkit0-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:polkit-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:polkit-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:polkit-devel-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:polkit-devel-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Micro 5.0:libpolkit0-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise Micro 5.0:libpolkit0-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Micro 5.0:polkit-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise Micro 5.0:polkit-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:libpolkit0-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise Micro 5.1:libpolkit0-0.116-3.6.1.s390x",
          "SUSE Linux Enterprise Micro 5.1:libpolkit0-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:polkit-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise Micro 5.1:polkit-0.116-3.6.1.s390x",
          "SUSE Linux Enterprise Micro 5.1:polkit-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpolkit0-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpolkit0-0.116-3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpolkit0-0.116-3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpolkit0-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-0.116-3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-0.116-3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-devel-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-devel-0.116-3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-devel-0.116-3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-devel-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP3:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:libpolkit0-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:polkit-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:polkit-devel-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libpolkit0-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libpolkit0-0.116-3.6.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libpolkit0-0.116-3.6.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:libpolkit0-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-0.116-3.6.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-0.116-3.6.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-devel-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-devel-0.116-3.6.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-devel-0.116-3.6.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-devel-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libpolkit0-0.116-3.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libpolkit0-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:polkit-0.116-3.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:polkit-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:polkit-devel-0.116-3.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:polkit-devel-0.116-3.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
          "SUSE Manager Proxy 4.1:libpolkit0-0.116-3.6.1.x86_64",
          "SUSE Manager Proxy 4.1:polkit-0.116-3.6.1.x86_64",
          "SUSE Manager Proxy 4.1:polkit-devel-0.116-3.6.1.x86_64",
          "SUSE Manager Proxy 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:libpolkit0-0.116-3.6.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:polkit-0.116-3.6.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:polkit-devel-0.116-3.6.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
          "SUSE Manager Server 4.1:libpolkit0-0.116-3.6.1.ppc64le",
          "SUSE Manager Server 4.1:libpolkit0-0.116-3.6.1.s390x",
          "SUSE Manager Server 4.1:libpolkit0-0.116-3.6.1.x86_64",
          "SUSE Manager Server 4.1:polkit-0.116-3.6.1.ppc64le",
          "SUSE Manager Server 4.1:polkit-0.116-3.6.1.s390x",
          "SUSE Manager Server 4.1:polkit-0.116-3.6.1.x86_64",
          "SUSE Manager Server 4.1:polkit-devel-0.116-3.6.1.ppc64le",
          "SUSE Manager Server 4.1:polkit-devel-0.116-3.6.1.s390x",
          "SUSE Manager Server 4.1:polkit-devel-0.116-3.6.1.x86_64",
          "SUSE Manager Server 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
          "SUSE Manager Server 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
          "SUSE Manager Server 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4034",
          "url": "https://www.suse.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194568 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1194568"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195125 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195125"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195136 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195136"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195246 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195246"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195265 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195265"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195278 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195278"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195528 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195528"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195541 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195541"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196165 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1196165"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196388 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1196388"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225668 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1225668"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:libpolkit0-0.116-3.6.1.aarch64",
            "SUSE Enterprise Storage 7:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Enterprise Storage 7:polkit-0.116-3.6.1.aarch64",
            "SUSE Enterprise Storage 7:polkit-0.116-3.6.1.x86_64",
            "SUSE Enterprise Storage 7:polkit-devel-0.116-3.6.1.aarch64",
            "SUSE Enterprise Storage 7:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Enterprise Storage 7:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
            "SUSE Enterprise Storage 7:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libpolkit0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:polkit-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:polkit-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:polkit-devel-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libpolkit0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:polkit-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:polkit-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:polkit-devel-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:libpolkit0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:polkit-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:polkit-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:libpolkit0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:libpolkit0-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:polkit-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:polkit-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:polkit-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpolkit0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpolkit0-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpolkit0-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-devel-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-devel-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-devel-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:polkit-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libpolkit0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libpolkit0-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libpolkit0-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-devel-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-devel-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-devel-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libpolkit0-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:polkit-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:polkit-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:polkit-devel-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Manager Proxy 4.1:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Manager Proxy 4.1:polkit-0.116-3.6.1.x86_64",
            "SUSE Manager Proxy 4.1:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Manager Proxy 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:polkit-0.116-3.6.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Manager Server 4.1:libpolkit0-0.116-3.6.1.ppc64le",
            "SUSE Manager Server 4.1:libpolkit0-0.116-3.6.1.s390x",
            "SUSE Manager Server 4.1:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Manager Server 4.1:polkit-0.116-3.6.1.ppc64le",
            "SUSE Manager Server 4.1:polkit-0.116-3.6.1.s390x",
            "SUSE Manager Server 4.1:polkit-0.116-3.6.1.x86_64",
            "SUSE Manager Server 4.1:polkit-devel-0.116-3.6.1.ppc64le",
            "SUSE Manager Server 4.1:polkit-devel-0.116-3.6.1.s390x",
            "SUSE Manager Server 4.1:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Manager Server 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
            "SUSE Manager Server 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
            "SUSE Manager Server 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:libpolkit0-0.116-3.6.1.aarch64",
            "SUSE Enterprise Storage 7:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Enterprise Storage 7:polkit-0.116-3.6.1.aarch64",
            "SUSE Enterprise Storage 7:polkit-0.116-3.6.1.x86_64",
            "SUSE Enterprise Storage 7:polkit-devel-0.116-3.6.1.aarch64",
            "SUSE Enterprise Storage 7:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Enterprise Storage 7:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
            "SUSE Enterprise Storage 7:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libpolkit0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:polkit-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:polkit-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:polkit-devel-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libpolkit0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:polkit-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:polkit-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:polkit-devel-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:libpolkit0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Micro 5.0:polkit-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Micro 5.0:polkit-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:libpolkit0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:libpolkit0-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:polkit-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:polkit-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:polkit-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpolkit0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpolkit0-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpolkit0-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-devel-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-devel-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-devel-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP3:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:polkit-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libpolkit0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libpolkit0-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libpolkit0-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-devel-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-devel-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-devel-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libpolkit0-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:polkit-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:polkit-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:polkit-devel-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Manager Proxy 4.1:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Manager Proxy 4.1:polkit-0.116-3.6.1.x86_64",
            "SUSE Manager Proxy 4.1:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Manager Proxy 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:polkit-0.116-3.6.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64",
            "SUSE Manager Server 4.1:libpolkit0-0.116-3.6.1.ppc64le",
            "SUSE Manager Server 4.1:libpolkit0-0.116-3.6.1.s390x",
            "SUSE Manager Server 4.1:libpolkit0-0.116-3.6.1.x86_64",
            "SUSE Manager Server 4.1:polkit-0.116-3.6.1.ppc64le",
            "SUSE Manager Server 4.1:polkit-0.116-3.6.1.s390x",
            "SUSE Manager Server 4.1:polkit-0.116-3.6.1.x86_64",
            "SUSE Manager Server 4.1:polkit-devel-0.116-3.6.1.ppc64le",
            "SUSE Manager Server 4.1:polkit-devel-0.116-3.6.1.s390x",
            "SUSE Manager Server 4.1:polkit-devel-0.116-3.6.1.x86_64",
            "SUSE Manager Server 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.ppc64le",
            "SUSE Manager Server 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.s390x",
            "SUSE Manager Server 4.1:typelib-1_0-Polkit-1_0-0.116-3.6.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-01-25T18:10:47Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4034"
    }
  ]
}
  suse-su-2022:0189-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for polkit",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for polkit fixes the following issues:\n\n- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "HPE-Helion-OpenStack-8-2022-189,SUSE-2022-189,SUSE-OpenStack-Cloud-8-2022-189,SUSE-OpenStack-Cloud-9-2022-189,SUSE-OpenStack-Cloud-Crowbar-8-2022-189,SUSE-OpenStack-Cloud-Crowbar-9-2022-189,SUSE-SLE-SAP-12-SP3-2022-189,SUSE-SLE-SAP-12-SP4-2022-189,SUSE-SLE-SDK-12-SP5-2022-189,SUSE-SLE-SERVER-12-SP2-BCL-2022-189,SUSE-SLE-SERVER-12-SP3-2022-189,SUSE-SLE-SERVER-12-SP3-BCL-2022-189,SUSE-SLE-SERVER-12-SP4-LTSS-2022-189,SUSE-SLE-SERVER-12-SP5-2022-189,SUSE-SLE-WE-12-SP5-2022-189",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0189-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2022:0189-1",
        "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220189-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2022:0189-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010074.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194568",
        "url": "https://bugzilla.suse.com/1194568"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4034 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4034/"
      }
    ],
    "title": "Security update for polkit",
    "tracking": {
      "current_release_date": "2022-01-25T18:09:21Z",
      "generator": {
        "date": "2022-01-25T18:09:21Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2022:0189-1",
      "initial_release_date": "2022-01-25T18:09:21Z",
      "revision_history": [
        {
          "date": "2022-01-25T18:09:21Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.113-5.24.1.aarch64",
                "product": {
                  "name": "libpolkit0-0.113-5.24.1.aarch64",
                  "product_id": "libpolkit0-0.113-5.24.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.113-5.24.1.aarch64",
                "product": {
                  "name": "polkit-0.113-5.24.1.aarch64",
                  "product_id": "polkit-0.113-5.24.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.113-5.24.1.aarch64",
                "product": {
                  "name": "polkit-devel-0.113-5.24.1.aarch64",
                  "product_id": "polkit-devel-0.113-5.24.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
                  "product_id": "typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-64bit-0.113-5.24.1.aarch64_ilp32",
                "product": {
                  "name": "libpolkit0-64bit-0.113-5.24.1.aarch64_ilp32",
                  "product_id": "libpolkit0-64bit-0.113-5.24.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.113-5.24.1.i586",
                "product": {
                  "name": "libpolkit0-0.113-5.24.1.i586",
                  "product_id": "libpolkit0-0.113-5.24.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.113-5.24.1.i586",
                "product": {
                  "name": "polkit-0.113-5.24.1.i586",
                  "product_id": "polkit-0.113-5.24.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.113-5.24.1.i586",
                "product": {
                  "name": "polkit-devel-0.113-5.24.1.i586",
                  "product_id": "polkit-devel-0.113-5.24.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.i586",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.i586",
                  "product_id": "typelib-1_0-Polkit-1_0-0.113-5.24.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "polkit-doc-0.113-5.24.1.noarch",
                "product": {
                  "name": "polkit-doc-0.113-5.24.1.noarch",
                  "product_id": "polkit-doc-0.113-5.24.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.113-5.24.1.ppc64le",
                "product": {
                  "name": "libpolkit0-0.113-5.24.1.ppc64le",
                  "product_id": "libpolkit0-0.113-5.24.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.113-5.24.1.ppc64le",
                "product": {
                  "name": "polkit-0.113-5.24.1.ppc64le",
                  "product_id": "polkit-0.113-5.24.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.113-5.24.1.ppc64le",
                "product": {
                  "name": "polkit-devel-0.113-5.24.1.ppc64le",
                  "product_id": "polkit-devel-0.113-5.24.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
                  "product_id": "typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.113-5.24.1.s390",
                "product": {
                  "name": "libpolkit0-0.113-5.24.1.s390",
                  "product_id": "libpolkit0-0.113-5.24.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.113-5.24.1.s390",
                "product": {
                  "name": "polkit-0.113-5.24.1.s390",
                  "product_id": "polkit-0.113-5.24.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.113-5.24.1.s390",
                "product": {
                  "name": "polkit-devel-0.113-5.24.1.s390",
                  "product_id": "polkit-devel-0.113-5.24.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.s390",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.s390",
                  "product_id": "typelib-1_0-Polkit-1_0-0.113-5.24.1.s390"
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.113-5.24.1.s390x",
                "product": {
                  "name": "libpolkit0-0.113-5.24.1.s390x",
                  "product_id": "libpolkit0-0.113-5.24.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit0-32bit-0.113-5.24.1.s390x",
                "product": {
                  "name": "libpolkit0-32bit-0.113-5.24.1.s390x",
                  "product_id": "libpolkit0-32bit-0.113-5.24.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.113-5.24.1.s390x",
                "product": {
                  "name": "polkit-0.113-5.24.1.s390x",
                  "product_id": "polkit-0.113-5.24.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.113-5.24.1.s390x",
                "product": {
                  "name": "polkit-devel-0.113-5.24.1.s390x",
                  "product_id": "polkit-devel-0.113-5.24.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
                  "product_id": "typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpolkit0-0.113-5.24.1.x86_64",
                "product": {
                  "name": "libpolkit0-0.113-5.24.1.x86_64",
                  "product_id": "libpolkit0-0.113-5.24.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-0.113-5.24.1.x86_64",
                "product": {
                  "name": "polkit-0.113-5.24.1.x86_64",
                  "product_id": "polkit-0.113-5.24.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
                "product": {
                  "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
                  "product_id": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libpolkit0-32bit-0.113-5.24.1.x86_64",
                "product": {
                  "name": "libpolkit0-32bit-0.113-5.24.1.x86_64",
                  "product_id": "libpolkit0-32bit-0.113-5.24.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "polkit-devel-0.113-5.24.1.x86_64",
                "product": {
                  "name": "polkit-devel-0.113-5.24.1.x86_64",
                  "product_id": "polkit-devel-0.113-5.24.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "HPE Helion OpenStack 8",
                "product": {
                  "name": "HPE Helion OpenStack 8",
                  "product_id": "HPE Helion OpenStack 8",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:hpe-helion-openstack:8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud 8",
                "product": {
                  "name": "SUSE OpenStack Cloud 8",
                  "product_id": "SUSE OpenStack Cloud 8",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud:8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud 9",
                "product": {
                  "name": "SUSE OpenStack Cloud 9",
                  "product_id": "SUSE OpenStack Cloud 9",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud:9"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud Crowbar 8",
                "product": {
                  "name": "SUSE OpenStack Cloud Crowbar 8",
                  "product_id": "SUSE OpenStack Cloud Crowbar 8",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud Crowbar 9",
                "product": {
                  "name": "SUSE OpenStack Cloud Crowbar 9",
                  "product_id": "SUSE OpenStack Cloud Crowbar 9",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-sdk:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP2-BCL",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP2-BCL",
                  "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-bcl:12:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP3-BCL",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP3-BCL",
                  "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-bcl:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.x86_64 as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:libpolkit0-0.113-5.24.1.x86_64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.x86_64 as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:polkit-0.113-5.24.1.x86_64"
        },
        "product_reference": "polkit-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64 as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.x86_64 as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:libpolkit0-0.113-5.24.1.x86_64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.x86_64 as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:polkit-0.113-5.24.1.x86_64"
        },
        "product_reference": "polkit-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64 as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.x86_64 as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:libpolkit0-0.113-5.24.1.x86_64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.x86_64 as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:polkit-0.113-5.24.1.x86_64"
        },
        "product_reference": "polkit-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64 as component of SUSE OpenStack Cloud 9",
          "product_id": "SUSE OpenStack Cloud 9:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:libpolkit0-0.113-5.24.1.x86_64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:polkit-0.113-5.24.1.x86_64"
        },
        "product_reference": "polkit-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:libpolkit0-0.113-5.24.1.x86_64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:polkit-0.113-5.24.1.x86_64"
        },
        "product_reference": "polkit-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
          "product_id": "SUSE OpenStack Cloud Crowbar 9:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpolkit0-0.113-5.24.1.ppc64le"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpolkit0-0.113-5.24.1.x86_64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:polkit-0.113-5.24.1.ppc64le"
        },
        "product_reference": "polkit-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:polkit-0.113-5.24.1.x86_64"
        },
        "product_reference": "polkit-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpolkit0-0.113-5.24.1.ppc64le"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpolkit0-0.113-5.24.1.x86_64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:polkit-0.113-5.24.1.ppc64le"
        },
        "product_reference": "polkit-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:polkit-0.113-5.24.1.x86_64"
        },
        "product_reference": "polkit-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.113-5.24.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:polkit-devel-0.113-5.24.1.aarch64"
        },
        "product_reference": "polkit-devel-0.113-5.24.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:polkit-devel-0.113-5.24.1.ppc64le"
        },
        "product_reference": "polkit-devel-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.113-5.24.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:polkit-devel-0.113-5.24.1.s390x"
        },
        "product_reference": "polkit-devel-0.113-5.24.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-devel-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:polkit-devel-0.113-5.24.1.x86_64"
        },
        "product_reference": "polkit-devel-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libpolkit0-0.113-5.24.1.x86_64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:polkit-0.113-5.24.1.x86_64"
        },
        "product_reference": "polkit-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpolkit0-0.113-5.24.1.aarch64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpolkit0-0.113-5.24.1.ppc64le"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpolkit0-0.113-5.24.1.s390x"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libpolkit0-0.113-5.24.1.x86_64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:polkit-0.113-5.24.1.aarch64"
        },
        "product_reference": "polkit-0.113-5.24.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:polkit-0.113-5.24.1.ppc64le"
        },
        "product_reference": "polkit-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:polkit-0.113-5.24.1.s390x"
        },
        "product_reference": "polkit-0.113-5.24.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:polkit-0.113-5.24.1.x86_64"
        },
        "product_reference": "polkit-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:libpolkit0-0.113-5.24.1.x86_64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:polkit-0.113-5.24.1.x86_64"
        },
        "product_reference": "polkit-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpolkit0-0.113-5.24.1.aarch64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpolkit0-0.113-5.24.1.ppc64le"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpolkit0-0.113-5.24.1.s390x"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libpolkit0-0.113-5.24.1.x86_64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:polkit-0.113-5.24.1.aarch64"
        },
        "product_reference": "polkit-0.113-5.24.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:polkit-0.113-5.24.1.ppc64le"
        },
        "product_reference": "polkit-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:polkit-0.113-5.24.1.s390x"
        },
        "product_reference": "polkit-0.113-5.24.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:polkit-0.113-5.24.1.x86_64"
        },
        "product_reference": "polkit-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:libpolkit0-0.113-5.24.1.aarch64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:libpolkit0-0.113-5.24.1.ppc64le"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:libpolkit0-0.113-5.24.1.s390x"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:libpolkit0-0.113-5.24.1.x86_64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:polkit-0.113-5.24.1.aarch64"
        },
        "product_reference": "polkit-0.113-5.24.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:polkit-0.113-5.24.1.ppc64le"
        },
        "product_reference": "polkit-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:polkit-0.113-5.24.1.s390x"
        },
        "product_reference": "polkit-0.113-5.24.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:polkit-0.113-5.24.1.x86_64"
        },
        "product_reference": "polkit-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpolkit0-0.113-5.24.1.aarch64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpolkit0-0.113-5.24.1.ppc64le"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpolkit0-0.113-5.24.1.s390x"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpolkit0-0.113-5.24.1.x86_64"
        },
        "product_reference": "libpolkit0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:polkit-0.113-5.24.1.aarch64"
        },
        "product_reference": "polkit-0.113-5.24.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:polkit-0.113-5.24.1.ppc64le"
        },
        "product_reference": "polkit-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:polkit-0.113-5.24.1.s390x"
        },
        "product_reference": "polkit-0.113-5.24.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "polkit-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:polkit-0.113-5.24.1.x86_64"
        },
        "product_reference": "polkit-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
        },
        "product_reference": "typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpolkit0-32bit-0.113-5.24.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:libpolkit0-32bit-0.113-5.24.1.x86_64"
        },
        "product_reference": "libpolkit0-32bit-0.113-5.24.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-4034",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4034"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:libpolkit0-0.113-5.24.1.x86_64",
          "HPE Helion OpenStack 8:polkit-0.113-5.24.1.x86_64",
          "HPE Helion OpenStack 8:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:libpolkit0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:polkit-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:libpolkit0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:polkit-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:libpolkit0-0.113-5.24.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:libpolkit0-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:libpolkit0-0.113-5.24.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:libpolkit0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:polkit-0.113-5.24.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:polkit-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:polkit-0.113-5.24.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:polkit-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:libpolkit0-0.113-5.24.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:libpolkit0-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:libpolkit0-0.113-5.24.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:libpolkit0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:polkit-0.113-5.24.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:polkit-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:polkit-0.113-5.24.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:polkit-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:libpolkit0-0.113-5.24.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:libpolkit0-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:libpolkit0-0.113-5.24.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:libpolkit0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:polkit-0.113-5.24.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:polkit-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:polkit-0.113-5.24.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:polkit-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpolkit0-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpolkit0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:polkit-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:polkit-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpolkit0-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpolkit0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:polkit-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:polkit-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpolkit0-0.113-5.24.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpolkit0-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpolkit0-0.113-5.24.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpolkit0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:polkit-0.113-5.24.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:polkit-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:polkit-0.113-5.24.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:polkit-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:polkit-devel-0.113-5.24.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:polkit-devel-0.113-5.24.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:polkit-devel-0.113-5.24.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:polkit-devel-0.113-5.24.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:libpolkit0-32bit-0.113-5.24.1.x86_64",
          "SUSE OpenStack Cloud 8:libpolkit0-0.113-5.24.1.x86_64",
          "SUSE OpenStack Cloud 8:polkit-0.113-5.24.1.x86_64",
          "SUSE OpenStack Cloud 8:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
          "SUSE OpenStack Cloud 9:libpolkit0-0.113-5.24.1.x86_64",
          "SUSE OpenStack Cloud 9:polkit-0.113-5.24.1.x86_64",
          "SUSE OpenStack Cloud 9:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:libpolkit0-0.113-5.24.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:polkit-0.113-5.24.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:libpolkit0-0.113-5.24.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:polkit-0.113-5.24.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 9:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4034",
          "url": "https://www.suse.com/security/cve/CVE-2021-4034"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194568 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1194568"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195125 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195125"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195136 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195136"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195246 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195246"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195265 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195265"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195278 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195278"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195528 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195528"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195541 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1195541"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196165 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1196165"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196388 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1196388"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225668 for CVE-2021-4034",
          "url": "https://bugzilla.suse.com/1225668"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:libpolkit0-0.113-5.24.1.x86_64",
            "HPE Helion OpenStack 8:polkit-0.113-5.24.1.x86_64",
            "HPE Helion OpenStack 8:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:polkit-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:polkit-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:libpolkit0-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:libpolkit0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:libpolkit0-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:polkit-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:polkit-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:polkit-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:polkit-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:libpolkit0-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:libpolkit0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:libpolkit0-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:polkit-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:polkit-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:polkit-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:polkit-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:libpolkit0-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:libpolkit0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:libpolkit0-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:polkit-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:polkit-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:polkit-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:polkit-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpolkit0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:polkit-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:polkit-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpolkit0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:polkit-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:polkit-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpolkit0-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpolkit0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpolkit0-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:polkit-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:polkit-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:polkit-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:polkit-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:polkit-devel-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:polkit-devel-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:polkit-devel-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:polkit-devel-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:libpolkit0-32bit-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud 8:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud 8:polkit-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud 8:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud 9:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud 9:polkit-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud 9:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:polkit-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:polkit-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:libpolkit0-0.113-5.24.1.x86_64",
            "HPE Helion OpenStack 8:polkit-0.113-5.24.1.x86_64",
            "HPE Helion OpenStack 8:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:polkit-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:polkit-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:libpolkit0-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:libpolkit0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:libpolkit0-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:polkit-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:polkit-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:polkit-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:polkit-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:libpolkit0-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:libpolkit0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:libpolkit0-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:polkit-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:polkit-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:polkit-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:polkit-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:libpolkit0-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:libpolkit0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:libpolkit0-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:polkit-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:polkit-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:polkit-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:polkit-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpolkit0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:polkit-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:polkit-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpolkit0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:polkit-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:polkit-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpolkit0-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpolkit0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpolkit0-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:polkit-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:polkit-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:polkit-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:polkit-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:polkit-devel-0.113-5.24.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:polkit-devel-0.113-5.24.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:polkit-devel-0.113-5.24.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:polkit-devel-0.113-5.24.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:libpolkit0-32bit-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud 8:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud 8:polkit-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud 8:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud 9:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud 9:polkit-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud 9:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:polkit-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:libpolkit0-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:polkit-0.113-5.24.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 9:typelib-1_0-Polkit-1_0-0.113-5.24.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-01-25T18:09:21Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4034"
    }
  ]
}
  cnvd-2022-07226
Vulnerability from cnvd
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://ubuntu.com/security/CVE-2021-4034 https://access.redhat.com/security/cve/CVE-2021-4034 https://security-tracker.debian.org/tracker/CVE-2021-4034
| Name | Linux polkit pkexec | 
|---|
{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2021-4034"
    }
  },
  "description": "pkexec\u662f\u2f00\u4e2aSUID root\u7a0b\u5e8f\uff0c\u9ed8\u8ba4\u5b89\u88c5\u5728\u6bcf\u4e2a\u4e3b\u8981Linux\u53d1\u2f8f\u7248\u4e0a\u3002\n\npolkit pkexec\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u5f97\u4e3b\u673a\u4e0a\u7684\u5b8c\u5168root\u7279\u6743\u3002",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttps://ubuntu.com/security/CVE-2021-4034\r\nhttps://access.redhat.com/security/cve/CVE-2021-4034\r\nhttps://security-tracker.debian.org/tracker/CVE-2021-4034",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2022-07226",
  "openTime": "2022-01-27",
  "patchDescription": "pkexec\u662f\u2f00\u4e2aSUID root\u7a0b\u5e8f\uff0c\u9ed8\u8ba4\u5b89\u88c5\u5728\u6bcf\u4e2a\u4e3b\u8981Linux\u53d1\u2f8f\u7248\u4e0a\u3002\r\n\r\npolkit pkexec\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u5f97\u4e3b\u673a\u4e0a\u7684\u5b8c\u5168root\u7279\u6743\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "polkit pkexec\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "Linux polkit pkexec"
  },
  "serverity": "\u9ad8",
  "submitTime": "2022-01-27",
  "title": "polkit pkexec\u6743\u9650\u63d0\u5347\u6f0f\u6d1e"
}
  fkie_cve-2021-4034
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html | Exploit, Third Party Advisory, VDB Entry | |
| secalert@redhat.com | http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html | Third Party Advisory, VDB Entry | |
| secalert@redhat.com | https://access.redhat.com/security/vulnerabilities/RHSB-2022-001 | Mitigation, Vendor Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2025869 | Issue Tracking, Patch | |
| secalert@redhat.com | https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf | Third Party Advisory | |
| secalert@redhat.com | https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683 | Patch | |
| secalert@redhat.com | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
| secalert@redhat.com | https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt | Exploit, Mitigation, Third Party Advisory | |
| secalert@redhat.com | https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/ | Exploit, Third Party Advisory | |
| secalert@redhat.com | https://www.starwindsoftware.com/security/sw-20220818-0001/ | Third Party Advisory | |
| secalert@redhat.com | https://www.suse.com/support/kb/doc/?id=000020564 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/vulnerabilities/RHSB-2022-001 | Mitigation, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2025869 | Issue Tracking, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt | Exploit, Mitigation, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/ | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.starwindsoftware.com/security/sw-20220818-0001/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.suse.com/support/kb/doc/?id=000020564 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.vicarius.io/vsociety/posts/pwnkit-pkexec-lpe-cve-2021-4034 | Exploit, Third Party Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-4034 | 
| Vendor | Product | Version | |
|---|---|---|---|
| polkit_project | polkit | * | |
| redhat | enterprise_linux_server_update_services_for_sap_solutions | 7.6 | |
| redhat | enterprise_linux_server_update_services_for_sap_solutions | 7.7 | |
| redhat | enterprise_linux | 8.0 | |
| redhat | enterprise_linux_desktop | 7.0 | |
| redhat | enterprise_linux_eus | 8.2 | |
| redhat | enterprise_linux_for_ibm_z_systems | 7.0 | |
| redhat | enterprise_linux_for_ibm_z_systems | 8.0 | |
| redhat | enterprise_linux_for_ibm_z_systems_eus | 8.2 | |
| redhat | enterprise_linux_for_ibm_z_systems_eus | 8.4 | |
| redhat | enterprise_linux_for_power_big_endian | 7.0 | |
| redhat | enterprise_linux_for_power_little_endian | 7.0 | |
| redhat | enterprise_linux_for_power_little_endian | 8.0 | |
| redhat | enterprise_linux_for_power_little_endian_eus | 8.1 | |
| redhat | enterprise_linux_for_power_little_endian_eus | 8.2 | |
| redhat | enterprise_linux_for_power_little_endian_eus | 8.4 | |
| redhat | enterprise_linux_for_scientific_computing | 7.0 | |
| redhat | enterprise_linux_server | 6.0 | |
| redhat | enterprise_linux_server | 7.0 | |
| redhat | enterprise_linux_server_aus | 7.3 | |
| redhat | enterprise_linux_server_aus | 7.4 | |
| redhat | enterprise_linux_server_aus | 7.6 | |
| redhat | enterprise_linux_server_aus | 7.7 | |
| redhat | enterprise_linux_server_aus | 8.2 | |
| redhat | enterprise_linux_server_aus | 8.4 | |
| redhat | enterprise_linux_server_eus | 8.4 | |
| redhat | enterprise_linux_server_tus | 7.6 | |
| redhat | enterprise_linux_server_tus | 7.7 | |
| redhat | enterprise_linux_server_tus | 8.2 | |
| redhat | enterprise_linux_server_tus | 8.4 | |
| redhat | enterprise_linux_server_update_services_for_sap_solutions | 8.1 | |
| redhat | enterprise_linux_server_update_services_for_sap_solutions | 8.2 | |
| redhat | enterprise_linux_server_update_services_for_sap_solutions | 8.4 | |
| redhat | enterprise_linux_workstation | 7.0 | |
| canonical | ubuntu_linux | 14.04 | |
| canonical | ubuntu_linux | 16.04 | |
| canonical | ubuntu_linux | 18.04 | |
| canonical | ubuntu_linux | 20.04 | |
| canonical | ubuntu_linux | 21.10 | |
| suse | enterprise_storage | 7.0 | |
| suse | linux_enterprise_high_performance_computing | 15.0 | |
| suse | manager_proxy | 4.1 | |
| suse | manager_server | 4.1 | |
| suse | linux_enterprise_desktop | 15 | |
| suse | linux_enterprise_server | 15 | |
| suse | linux_enterprise_server | 15 | |
| suse | linux_enterprise_workstation_extension | 12 | |
| oracle | http_server | 12.2.1.3.0 | |
| oracle | http_server | 12.2.1.4.0 | |
| oracle | zfs_storage_appliance_kit | 8.8 | |
| siemens | sinumerik_edge | * | |
| siemens | scalance_lpe9403_firmware | * | |
| siemens | scalance_lpe9403 | - | |
| starwindsoftware | command_center | 1.0 | |
| starwindsoftware | starwind_virtual_san | v8 | 
{
  "cisaActionDue": "2022-07-18",
  "cisaExploitAdd": "2022-06-27",
  "cisaRequiredAction": "Apply updates per vendor instructions.",
  "cisaVulnerabilityName": "Red Hat Polkit Out-of-Bounds Read and Write Vulnerability",
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F01D94C9-1E04-413B-8636-1AAC6D9E84D6",
              "versionEndExcluding": "121",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB70A2F8-EAB3-4898-9353-F679FF721C82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB3AC848-C2D0-4878-8619-F5815173555D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "831F0F47-3565-4763-B16F-C87B1FF2035E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "566507B6-AC95-47F7-A3FB-C6F414E45F51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C21FE1-EA5C-498F-9C6C-D05F91A88217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AB105EC-19F9-424A-86F1-305A6FD74A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9BD9AE-46FC-4609-8D99-A3CFE91D58D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CDCFF34-6F1D-45A1-BE37-6A0E17B04801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A684C7-88FD-43C4-9BDB-AE337FCBD0AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "47811209-5CE5-4375-8391-B0A7F6A0E420",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EB6F417-25D0-4A28-B7BA-D21929EAA9E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C80DB2-4A78-4EC9-B2A8-1E4D902C4834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "983533DD-3970-4A37-9A9C-582BD48AA1E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "37CE1DC7-72C5-483C-8921-0B462C8284D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6897676D-53F9-45B3-B27F-7FF9A4C58D33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E28F226A-CBC7-4A32-BE58-398FA5B42481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "61917784-47F1-4328-BA1F-A88C5E23496B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09ACF2D-D83F-4A86-8185-9569605D8EE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC10D919-57FD-4725-B8D2-39ECB476902F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "48C2E003-A71C-4D06-B8B3-F93160568182",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3921C1CF-A16D-4727-99AD-03EFFA7C91CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC6DD887-9744-43EA-8B3C-44C6B6339590",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAE4D2D0-CEEB-416F-8BC5-A7987DF56190",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:suse:enterprise_storage:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7305944-AC9C-47A3-AADF-71A8B24830D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:-:*:*:*",
              "matchCriteriaId": "CDFEA8DC-7D78-4ACD-A95C-9408F45EEAE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:suse:manager_proxy:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9910C73A-3BCD-4F56-8C7D-79CB289640A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:suse:manager_server:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5810E98-7BF5-42E2-9DE9-661049ABE367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:15:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "8C4F62C0-4188-433A-8292-559025CA23C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:-:*:*",
              "matchCriteriaId": "07D416C5-4A0F-4EF3-A3DE-A028AAA4F739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:sap:*:*",
              "matchCriteriaId": "F6C1736B-0505-4C19-98B7-90C8359F3BCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "243B9B56-C744-4C1C-B42E-158C1B041B6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFC79B17-E9D2-44D5-93ED-2F959E7A3D43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD04BEE5-E9A8-4584-A68C-0195CE9C402C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:siemens:sinumerik_edge:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D069EA07-88A5-4058-A2BC-44F94D9ACC9A",
              "versionEndExcluding": "3.3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC41AD4-69E5-48D8-8216-671F485C3C40",
              "versionEndExcluding": "2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52A77C9D-E59C-4397-B834-797D7B334A6B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:starwindsoftware:command_center:1.0:update3_build5871:*:*:*:*:*:*",
              "matchCriteriaId": "B323EF31-7A67-4458-8323-86F8AA58268C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build14338:*:*:*:*:*:*",
              "matchCriteriaId": "14AF427F-BC75-40C7-9579-34A74E2E475D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 una vulnerabilidad de escalada de privilegios local en la utilidad pkexec de polkit. La aplicaci\u00f3n pkexec es una herramienta setuid dise\u00f1ada para permitir a usuarios sin privilegios ejecutar comandos como usuarios privilegiados de acuerdo con pol\u00edticas predefinidas. La versi\u00f3n actual de pkexec no maneja correctamente el recuento de par\u00e1metros de llamada y termina intentando ejecutar variables de entorno como comandos. Un atacante puede aprovechar esto creando variables de entorno de tal manera que induzcan a pkexec a ejecutar c\u00f3digo arbitrario. Cuando se ejecuta con \u00e9xito, el ataque puede provocar una escalada de privilegios locales otorgando a los usuarios sin privilegios derechos administrativos en la m\u00e1quina de destino."
    }
  ],
  "id": "CVE-2021-4034",
  "lastModified": "2025-10-22T00:17:50.363",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2022-01-28T20:15:12.193",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.starwindsoftware.com/security/sw-20220818-0001/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.suse.com/support/kb/doc/?id=000020564"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.starwindsoftware.com/security/sw-20220818-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.suse.com/support/kb/doc/?id=000020564"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.vicarius.io/vsociety/posts/pwnkit-pkexec-lpe-cve-2021-4034"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-4034"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        },
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  msrc_cve-2021-4034
Vulnerability from csaf_microsoft
Notes
{
  "document": {
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2021-4034 A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine. - VEX",
        "url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2021-4034.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
    "tracking": {
      "current_release_date": "2022-01-30T08:00:00.000Z",
      "generator": {
        "date": "2025-10-19T23:13:23.055Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2021-4034",
      "initial_release_date": "2022-01-02T00:00:00.000Z",
      "revision_history": [
        {
          "date": "2022-01-30T08:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "1.0",
                "product": {
                  "name": "CBL Mariner 1.0",
                  "product_id": "16820"
                }
              },
              {
                "category": "product_version",
                "name": "2.0",
                "product": {
                  "name": "CBL Mariner 2.0",
                  "product_id": "17086"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccm1 polkit 0.116-6",
                "product": {
                  "name": "\u003ccm1 polkit 0.116-6",
                  "product_id": "2"
                }
              },
              {
                "category": "product_version",
                "name": "cm1 polkit 0.116-6",
                "product": {
                  "name": "cm1 polkit 0.116-6",
                  "product_id": "18898"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 polkit 0.119-2",
                "product": {
                  "name": "\u003ccbl2 polkit 0.119-2",
                  "product_id": "1"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 polkit 0.119-2",
                "product": {
                  "name": "cbl2 polkit 0.119-2",
                  "product_id": "18906"
                }
              }
            ],
            "category": "product_name",
            "name": "polkit"
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccm1 polkit 0.116-6 as a component of CBL Mariner 1.0",
          "product_id": "16820-2"
        },
        "product_reference": "2",
        "relates_to_product_reference": "16820"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cm1 polkit 0.116-6 as a component of CBL Mariner 1.0",
          "product_id": "18898-16820"
        },
        "product_reference": "18898",
        "relates_to_product_reference": "16820"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 polkit 0.119-2 as a component of CBL Mariner 2.0",
          "product_id": "17086-1"
        },
        "product_reference": "1",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 polkit 0.119-2 as a component of CBL Mariner 2.0",
          "product_id": "18906-17086"
        },
        "product_reference": "18906",
        "relates_to_product_reference": "17086"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-4034",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "general",
          "text": "redhat",
          "title": "Assigning CNA"
        }
      ],
      "product_status": {
        "fixed": [
          "18898-16820",
          "18906-17086"
        ],
        "known_affected": [
          "16820-2",
          "17086-1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-4034 A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine. - VEX",
          "url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2021-4034.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-01-30T08:00:00.000Z",
          "details": "0.116-6:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "16820-2"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2022-01-30T08:00:00.000Z",
          "details": "0.119-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-1"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalsScore": 0.0,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "temporalScore": 7.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "16820-2",
            "17086-1"
          ]
        }
      ],
      "title": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine."
    }
  ]
}
  gsd-2021-4034
Vulnerability from gsd
{
  "GSD": {
    "affected_component": "pkexec",
    "alias": "CVE-2021-4034",
    "attack_vector": "local",
    "credit": "",
    "description": "To quote the Qualys Research Team: has discovered a memory corruption vulnerability in polkit\u2019s pkexec, a SUID-root program that is installed by default on every major Linux distribution. This easily exploited vulnerability allows any unprivileged user to gain full root privileges on a vulnerable host by exploiting this vulnerability in its default configuration.\n\n# Workaround\n\nchmod 0755 /usr/bin/pkexec",
    "extended_references": [
      {
        "note": "introduced",
        "type": "commit",
        "value": "c8c3d835d24fc4ce5a9c596c7d55d85a0311e8d1"
      },
      {
        "note": "fixed",
        "type": "commit",
        "value": "a2bf5c9c83b6ae46cbd5c779d3055bff81ded683"
      }
    ],
    "id": "GSD-2021-4034",
    "impact": "local code execution as root",
    "notes": "",
    "product_name": "Polkit",
    "product_version": "all versions prior to commit a2bf5c9c83b6ae46cbd5c779d3055bff81ded683",
    "references": [
      "https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034",
      "https://gitlab.freedesktop.org/polkit/polkit/-/commit/c8c3d835d24fc4ce5a9c596c7d55d85a0311e8d1",
      "https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683",
      "https://ryiron.wordpress.com/2013/12/16/argv-silliness/",
      "https://pythonrepo.com/repo/joeammond-CVE-2021-4034",
      "https://github.com/berdav/CVE-2021-4034",
      "https://github.com/arthepsy/CVE-2021-4034",
      "https://github.com/joeammond/CVE-2021-4034",
      "https://packetstormsecurity.com/files/165728/cve-2021-4043-poc.c",
      "https://security-tracker.debian.org/tracker/CVE-2021-4034",
      "https://access.redhat.com/security/cve/CVE-2021-4034",
      "https://blog.cloudlinux.com/cve-2021-4034-cloudlinux-os-7-7-hybrid-and-8-updated",
      "https://www.suse.com/security/cve/CVE-2021-4034.html",
      "https://www.debian.org/security/2022/dsa-5059",
      "https://access.redhat.com/errata/RHSA-2022:0540",
      "https://access.redhat.com/errata/RHSA-2022:0443",
      "https://access.redhat.com/errata/RHSA-2022:0274",
      "https://access.redhat.com/errata/RHSA-2022:0273",
      "https://access.redhat.com/errata/RHSA-2022:0272",
      "https://access.redhat.com/errata/RHSA-2022:0271",
      "https://access.redhat.com/errata/RHSA-2022:0270",
      "https://access.redhat.com/errata/RHSA-2022:0269",
      "https://access.redhat.com/errata/RHSA-2022:0268",
      "https://access.redhat.com/errata/RHSA-2022:0267",
      "https://access.redhat.com/errata/RHSA-2022:0266",
      "https://access.redhat.com/errata/RHSA-2022:0265",
      "https://ubuntu.com/security/CVE-2021-4034",
      "https://advisories.mageia.org/CVE-2021-4034.html",
      "https://security.archlinux.org/CVE-2021-4034",
      "https://linux.oracle.com/cve/CVE-2021-4034.html",
      "https://packetstormsecurity.com/files/cve/CVE-2021-4034"
    ],
    "reporter": "kurtseifried",
    "reporter_id": 582211,
    "vendor_name": "Polkit",
    "vulnerability_type": "unspecified"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2021-4034"
      ],
      "details": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
      "id": "GSD-2021-4034",
      "modified": "2023-12-13T01:23:11.709043Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secalert@redhat.com",
        "ID": "CVE-2021-4034",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "polkit",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "all"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "cweId": "CWE-787",
                "lang": "eng",
                "value": "(CWE-787|CWE-125)"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
            "refsource": "MISC",
            "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
          },
          {
            "name": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
            "refsource": "MISC",
            "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
          },
          {
            "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869",
            "refsource": "MISC",
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
          },
          {
            "name": "https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683",
            "refsource": "MISC",
            "url": "https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683"
          },
          {
            "name": "https://www.oracle.com/security-alerts/cpuapr2022.html",
            "refsource": "MISC",
            "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
          },
          {
            "name": "http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html",
            "refsource": "MISC",
            "url": "http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html"
          },
          {
            "name": "http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html",
            "refsource": "MISC",
            "url": "http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html"
          },
          {
            "name": "https://www.suse.com/support/kb/doc/?id=000020564",
            "refsource": "MISC",
            "url": "https://www.suse.com/support/kb/doc/?id=000020564"
          },
          {
            "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf",
            "refsource": "MISC",
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf"
          },
          {
            "name": "https://www.starwindsoftware.com/security/sw-20220818-0001/",
            "refsource": "MISC",
            "url": "https://www.starwindsoftware.com/security/sw-20220818-0001/"
          },
          {
            "name": "https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/",
            "refsource": "MISC",
            "url": "https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "121",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:suse:manager_server:4.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp5:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:15:sp2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:suse:enterprise_storage:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:suse:manager_proxy:4.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:-:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:-:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:sap:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:siemens:sinumerik_edge:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "3.3.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "2.0",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build14338:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:starwindsoftware:starwind_hyperconverged_appliance:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:starwindsoftware:command_center:1.0:update3_build5871:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2021-4034"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-125"
                },
                {
                  "lang": "en",
                  "value": "CWE-787"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
              "refsource": "MISC",
              "tags": [
                "Exploit",
                "Mitigation",
                "Third Party Advisory"
              ],
              "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
            },
            {
              "name": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
              "refsource": "MISC",
              "tags": [
                "Mitigation",
                "Vendor Advisory"
              ],
              "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869",
              "refsource": "MISC",
              "tags": [
                "Issue Tracking",
                "Patch",
                "Vendor Advisory"
              ],
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
            },
            {
              "name": "https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683",
              "refsource": "MISC",
              "tags": [
                "Patch",
                "Third Party Advisory"
              ],
              "url": "https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683"
            },
            {
              "name": "http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html",
              "refsource": "MISC",
              "tags": [
                "Exploit",
                "Third Party Advisory",
                "VDB Entry"
              ],
              "url": "http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html"
            },
            {
              "name": "http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory",
                "VDB Entry"
              ],
              "url": "http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html"
            },
            {
              "name": "https://www.suse.com/support/kb/doc/?id=000020564",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.suse.com/support/kb/doc/?id=000020564"
            },
            {
              "name": "https://www.oracle.com/security-alerts/cpuapr2022.html",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf"
            },
            {
              "name": "https://www.starwindsoftware.com/security/sw-20220818-0001/",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.starwindsoftware.com/security/sw-20220818-0001/"
            },
            {
              "name": "https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/",
              "refsource": "MISC",
              "tags": [],
              "url": "https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "exploitabilityScore": 3.9,
          "impactScore": 10.0,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "HIGH",
          "userInteractionRequired": false
        },
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "exploitabilityScore": 1.8,
          "impactScore": 5.9
        }
      },
      "lastModifiedDate": "2023-10-18T01:15Z",
      "publishedDate": "2022-01-28T20:15Z"
    }
  }
}
  ghsa-qgr2-xgqv-24x8
Vulnerability from github
A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.
{
  "affected": [],
  "aliases": [
    "CVE-2021-4034"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-125",
      "CWE-787"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2022-01-28T20:15:00Z",
    "severity": "HIGH"
  },
  "details": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
  "id": "GHSA-qgr2-xgqv-24x8",
  "modified": "2025-10-22T00:32:28Z",
  "published": "2022-01-29T00:00:42Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034"
    },
    {
      "type": "WEB",
      "url": "https://www.vicarius.io/vsociety/posts/pwnkit-pkexec-lpe-cve-2021-4034"
    },
    {
      "type": "WEB",
      "url": "https://www.suse.com/support/kb/doc/?id=000020564"
    },
    {
      "type": "WEB",
      "url": "https://www.starwindsoftware.com/security/sw-20220818-0001"
    },
    {
      "type": "WEB",
      "url": "https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034"
    },
    {
      "type": "WEB",
      "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
    },
    {
      "type": "WEB",
      "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
    },
    {
      "type": "WEB",
      "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-4034"
    },
    {
      "type": "WEB",
      "url": "https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683"
    },
    {
      "type": "WEB",
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/security/cve/CVE-2021-4034"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2022:0540"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2022:0443"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2022:0274"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2022:0273"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2022:0272"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2022:0271"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2022:0270"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2022:0269"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2022:0268"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2022:0267"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2022:0266"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2022:0265"
    },
    {
      "type": "WEB",
      "url": "http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html"
    },
    {
      "type": "WEB",
      "url": "http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.