Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-44964 (GCVE-0-2021-44964)
Vulnerability from cvelistv5
Published
2022-03-14 14:24
      Modified
2024-08-04 04:32
      
          Severity ?
        
        
          VLAI Severity ?
        
        
          EPSS score ?
        
        CWE
          - n/a
Summary
Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.
            
          
        References
          {
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T04:32:13.466Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-14T14:24:51",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-44964",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html",
              "refsource": "MISC",
              "url": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html"
            },
            {
              "name": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html",
              "refsource": "MISC",
              "url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
            },
            {
              "name": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html",
              "refsource": "MISC",
              "url": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html"
            },
            {
              "name": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html",
              "refsource": "MISC",
              "url": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html"
            },
            {
              "name": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability",
              "refsource": "MISC",
              "url": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-44964",
    "datePublished": "2022-03-14T14:24:51",
    "dateReserved": "2021-12-13T00:00:00",
    "dateUpdated": "2024-08-04T04:32:13.466Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-44964\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-03-14T15:15:09.373\",\"lastModified\":\"2024-11-21T06:31:44.853\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\"},{\"lang\":\"es\",\"value\":\"Un uso de memoria previamente liberada en el recolector de basura y en el finalizador de lgc.c en el int\u00e9rprete de Lua versiones 5.4.0~5.4.3, permite a atacantes llevar a cabo un Escape del Sandbox por medio de un archivo de script dise\u00f1ado\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H\",\"baseScore\":6.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.4.0\",\"versionEndIncluding\":\"5.4.3\",\"matchCriteriaId\":\"36E29101-6009-4A41-AF33-FDD5EA753F91\"}]}]}],\"references\":[{\"url\":\"http://lua-users.org/lists/lua-l/2021-11/msg00186.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Technical Description\",\"Vendor Advisory\"]},{\"url\":\"http://lua-users.org/lists/lua-l/2021-12/msg00007.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://lua-users.org/lists/lua-l/2021-12/msg00015.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://lua-users.org/lists/lua-l/2021-12/msg00030.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://lua-users.org/lists/lua-l/2021-11/msg00186.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Technical Description\",\"Vendor Advisory\"]},{\"url\":\"http://lua-users.org/lists/lua-l/2021-12/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://lua-users.org/lists/lua-l/2021-12/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://lua-users.org/lists/lua-l/2021-12/msg00030.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}"
  }
}
  wid-sec-w-2023-1542
Vulnerability from csaf_certbund
Published
2023-06-22 22:00
    Modified
2025-10-23 22:00
    Summary
Red Hat OpenShift: Mehrere Schwachstellen
    Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
    Produktbeschreibung
Red Hat OpenShift ist eine "Platform as a Service" (PaaS) Lösung zur Bereitstellung von Applikationen in der Cloud.
    Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Zustand herbeizuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
    Betroffene Betriebssysteme
- Linux
    {
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-1542 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1542.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-1542 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1542"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3742 vom 2023-06-22",
        "url": "https://access.redhat.com/errata/RHSA-2023:3742"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3612 vom 2023-06-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:3614"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3615 vom 2023-06-22",
        "url": "https://access.redhat.com/errata/RHSA-2023:3615"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3613 vom 2023-06-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:3613"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory vom 2023-06-29",
        "url": "https://access.redhat.com/errata/RHSA-2023:3918"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3943 vom 2023-06-29",
        "url": "https://access.redhat.com/errata/RHSA-2023:3943"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3910 vom 2023-07-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:3910"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3915 vom 2023-07-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:3915"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3925 vom 2023-07-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:3925"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4003 vom 2023-07-10",
        "url": "https://access.redhat.com/errata/RHSA-2023:4003"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-6CFE7492C1 vom 2023-07-16",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-6cfe7492c1"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-AA7C75ED4A vom 2023-07-16",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-aa7c75ed4a"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4025 vom 2023-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:4025"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4112 vom 2023-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:4112"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4113 vom 2023-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:4113"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4114 vom 2023-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:4114"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4053 vom 2023-07-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:4053"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4204 vom 2023-07-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:4204"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4090 vom 2023-07-21",
        "url": "https://access.redhat.com/errata/RHSA-2023:4090"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4241 vom 2023-07-21",
        "url": "https://access.redhat.com/errata/RHSA-2023:4241"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4238 vom 2023-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:4238"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4093 vom 2023-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:4093"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4091 vom 2023-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:4091"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4225 vom 2023-07-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:4225"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4226 vom 2023-07-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:4226"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4470 vom 2023-08-03",
        "url": "https://access.redhat.com/errata/RHSA-2023:4470"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4335 vom 2023-08-08",
        "url": "https://access.redhat.com/errata/RHSA-2023:4335"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4674 vom 2023-08-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:4674"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4983 vom 2023-09-05",
        "url": "https://access.redhat.com/errata/RHSA-2023:4983"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5103 vom 2023-09-12",
        "url": "https://access.redhat.com/errata/RHSA-2023:5103"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5233 vom 2023-09-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5233"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5314 vom 2023-09-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:5314"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6316 vom 2023-11-07",
        "url": "https://access.redhat.com/errata/RHSA-2023:6316"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7058 vom 2023-11-15",
        "url": "https://access.redhat.com/errata/RHSA-2023:7058"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-6939 vom 2023-11-21",
        "url": "https://linux.oracle.com/errata/ELSA-2023-6939.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-14A33318B8 vom 2023-12-03",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-14a33318b8"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7672 vom 2023-12-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:7672"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7820 vom 2023-12-14",
        "url": "https://access.redhat.com/errata/RHSA-2023:7820"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5006 vom 2023-12-30",
        "url": "https://access.redhat.com/errata/RHSA-2023:5006"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7823 vom 2024-01-05",
        "url": "https://access.redhat.com/errata/RHSA-2023:7823"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0139 vom 2024-01-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:0139"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0143 vom 2024-01-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:0143"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0137 vom 2024-01-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:0137"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0121 vom 2024-01-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:0121"
      },
      {
        "category": "external",
        "summary": "Meinberg Security Advisory",
        "url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2024-01-lantime-firmware-v7-08-007.htm"
      },
      {
        "category": "external",
        "summary": "Gentoo Linux Security Advisory GLSA-202405-04 vom 2024-05-04",
        "url": "https://security.gentoo.org/glsa/202405-04"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2987 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:2987"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3254 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:3254"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:4631 vom 2024-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2024:4631"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19094 vom 2025-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2025:19094"
      }
    ],
    "source_lang": "en-US",
    "title": "Red Hat OpenShift: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-10-23T22:00:00.000+00:00",
      "generator": {
        "date": "2025-10-24T08:33:28.970+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2023-1542",
      "initial_release_date": "2023-06-22T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2023-06-22T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2023-06-25T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-06-26T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-06-28T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-06-29T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-05T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-06T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-10T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-16T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2023-07-17T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-18T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-20T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-26T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-08-03T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-08-07T22:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-08-23T22:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-09-05T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-09-12T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-09-19T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-09-20T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-07T23:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-14T23:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-21T23:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2023-12-03T23:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2023-12-06T23:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-12-13T23:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-01T23:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-04T23:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-10T23:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-30T23:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Meinberg aufgenommen"
        },
        {
          "date": "2024-05-05T22:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von Gentoo aufgenommen"
        },
        {
          "date": "2024-05-21T22:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-07-18T22:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-10-23T22:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "34"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.08.007",
                "product": {
                  "name": "Meinberg LANTIME \u003c7.08.007",
                  "product_id": "T032435"
                }
              },
              {
                "category": "product_version",
                "name": "7.08.007",
                "product": {
                  "name": "Meinberg LANTIME 7.08.007",
                  "product_id": "T032435-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:meinberg:lantime:7.08.007"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "LANTIME"
          }
        ],
        "category": "vendor",
        "name": "Meinberg"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "67646",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Advanced Cluster Security for Kubernetes 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Advanced Cluster Security for Kubernetes 4",
                  "product_id": "T027916",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security_for_kubernetes_4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Service Interconnect 1",
                "product": {
                  "name": "Red Hat Enterprise Linux Service Interconnect 1",
                  "product_id": "T028472",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:service_interconnect_1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift",
                "product": {
                  "name": "Red Hat OpenShift",
                  "product_id": "T008027",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:-"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.12",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.12",
                  "product_id": "T026435",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform_4.12"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.13.4",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.13.4",
                  "product_id": "T028225"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.13.4",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.13.4",
                  "product_id": "T028225-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.13.4"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Data Foundation \u003c4.13.0",
                "product": {
                  "name": "Red Hat OpenShift Data Foundation \u003c4.13.0",
                  "product_id": "T028289"
                }
              },
              {
                "category": "product_version",
                "name": "Data Foundation 4.13.0",
                "product": {
                  "name": "Red Hat OpenShift Data Foundation 4.13.0",
                  "product_id": "T028289-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:data_foundation_4.13.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.12.22",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.12.22",
                  "product_id": "T028307"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.12.22",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.12.22",
                  "product_id": "T028307-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.22"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.11.44",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.11.44",
                  "product_id": "T028416"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.11.44",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.11.44",
                  "product_id": "T028416-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.11.44"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Data Foundation \u003c4.12.10",
                "product": {
                  "name": "Red Hat OpenShift Data Foundation \u003c4.12.10",
                  "product_id": "T031698"
                }
              },
              {
                "category": "product_version",
                "name": "Data Foundation 4.12.10",
                "product": {
                  "name": "Red Hat OpenShift Data Foundation 4.12.10",
                  "product_id": "T031698-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:data_foundation__4.12.10"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.14.0",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.14.0",
                  "product_id": "T031839"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.14.0",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.14.0",
                  "product_id": "T031839-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.12.46",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.12.46",
                  "product_id": "T031870"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.12.46",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.12.46",
                  "product_id": "T031870-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.46"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OpenShift"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-20107",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2015-20107"
    },
    {
      "cve": "CVE-2018-25032",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2018-25032"
    },
    {
      "cve": "CVE-2020-10735",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2020-10735"
    },
    {
      "cve": "CVE-2020-16250",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2020-16250"
    },
    {
      "cve": "CVE-2020-16251",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2020-16251"
    },
    {
      "cve": "CVE-2020-17049",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2020-17049"
    },
    {
      "cve": "CVE-2021-28861",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-28861"
    },
    {
      "cve": "CVE-2021-3765",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-3765"
    },
    {
      "cve": "CVE-2021-3807",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-3807"
    },
    {
      "cve": "CVE-2021-4231",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-4231"
    },
    {
      "cve": "CVE-2021-4235",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-4235"
    },
    {
      "cve": "CVE-2021-4238",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-4238"
    },
    {
      "cve": "CVE-2021-43519",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-43519"
    },
    {
      "cve": "CVE-2021-43998",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-43998"
    },
    {
      "cve": "CVE-2021-44531",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-44531"
    },
    {
      "cve": "CVE-2021-44532",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-44532"
    },
    {
      "cve": "CVE-2021-44533",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-44533"
    },
    {
      "cve": "CVE-2021-44964",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-44964"
    },
    {
      "cve": "CVE-2021-46828",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-46828"
    },
    {
      "cve": "CVE-2021-46848",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-46848"
    },
    {
      "cve": "CVE-2022-0670",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-0670"
    },
    {
      "cve": "CVE-2022-1271",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1271"
    },
    {
      "cve": "CVE-2022-1304",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1304"
    },
    {
      "cve": "CVE-2022-1348",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1348"
    },
    {
      "cve": "CVE-2022-1586",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1586"
    },
    {
      "cve": "CVE-2022-1587",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1587"
    },
    {
      "cve": "CVE-2022-21824",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-21824"
    },
    {
      "cve": "CVE-2022-2309",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2309"
    },
    {
      "cve": "CVE-2022-23540",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-23540"
    },
    {
      "cve": "CVE-2022-23541",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-23541"
    },
    {
      "cve": "CVE-2022-24903",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-24903"
    },
    {
      "cve": "CVE-2022-2509",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2509"
    },
    {
      "cve": "CVE-2022-26280",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-26280"
    },
    {
      "cve": "CVE-2022-27664",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-27664"
    },
    {
      "cve": "CVE-2022-2795",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2795"
    },
    {
      "cve": "CVE-2022-2879",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2879"
    },
    {
      "cve": "CVE-2022-2880",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2880"
    },
    {
      "cve": "CVE-2022-28805",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-28805"
    },
    {
      "cve": "CVE-2022-29154",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-29154"
    },
    {
      "cve": "CVE-2022-30635",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-30635"
    },
    {
      "cve": "CVE-2022-3094",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3094"
    },
    {
      "cve": "CVE-2022-31129",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-31129"
    },
    {
      "cve": "CVE-2022-32189",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-32189"
    },
    {
      "cve": "CVE-2022-32190",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-32190"
    },
    {
      "cve": "CVE-2022-33099",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-33099"
    },
    {
      "cve": "CVE-2022-3358",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3358"
    },
    {
      "cve": "CVE-2022-34903",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-34903"
    },
    {
      "cve": "CVE-2022-3515",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3515"
    },
    {
      "cve": "CVE-2022-3517",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3517"
    },
    {
      "cve": "CVE-2022-35737",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-35737"
    },
    {
      "cve": "CVE-2022-36227",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-36227"
    },
    {
      "cve": "CVE-2022-3715",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3715"
    },
    {
      "cve": "CVE-2022-3736",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3736"
    },
    {
      "cve": "CVE-2022-37434",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-37434"
    },
    {
      "cve": "CVE-2022-38149",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-38149"
    },
    {
      "cve": "CVE-2022-3821",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3821"
    },
    {
      "cve": "CVE-2022-38900",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-38900"
    },
    {
      "cve": "CVE-2022-3924",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3924"
    },
    {
      "cve": "CVE-2022-40023",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-40023"
    },
    {
      "cve": "CVE-2022-40303",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-40303"
    },
    {
      "cve": "CVE-2022-40304",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-40304"
    },
    {
      "cve": "CVE-2022-40897",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-40897"
    },
    {
      "cve": "CVE-2022-41316",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41316"
    },
    {
      "cve": "CVE-2022-41715",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41715"
    },
    {
      "cve": "CVE-2022-41717",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41717"
    },
    {
      "cve": "CVE-2022-41723",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41723"
    },
    {
      "cve": "CVE-2022-41724",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41724"
    },
    {
      "cve": "CVE-2022-41725",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41725"
    },
    {
      "cve": "CVE-2022-42010",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42010"
    },
    {
      "cve": "CVE-2022-42011",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42011"
    },
    {
      "cve": "CVE-2022-42012",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42012"
    },
    {
      "cve": "CVE-2022-42898",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42898"
    },
    {
      "cve": "CVE-2022-42919",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42919"
    },
    {
      "cve": "CVE-2022-43680",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-43680"
    },
    {
      "cve": "CVE-2022-4415",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-4415"
    },
    {
      "cve": "CVE-2022-45061",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-45061"
    },
    {
      "cve": "CVE-2022-45873",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-45873"
    },
    {
      "cve": "CVE-2022-46175",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-46175"
    },
    {
      "cve": "CVE-2022-47024",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-47024"
    },
    {
      "cve": "CVE-2022-47629",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-47629"
    },
    {
      "cve": "CVE-2022-48303",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-48303"
    },
    {
      "cve": "CVE-2022-48337",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-48337"
    },
    {
      "cve": "CVE-2022-48338",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-48338"
    },
    {
      "cve": "CVE-2022-48339",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-48339"
    },
    {
      "cve": "CVE-2023-0361",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-0361"
    },
    {
      "cve": "CVE-2023-0620",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-0620"
    },
    {
      "cve": "CVE-2023-0665",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-0665"
    },
    {
      "cve": "CVE-2023-22809",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-22809"
    },
    {
      "cve": "CVE-2023-24329",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-24329"
    },
    {
      "cve": "CVE-2023-2491",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-2491"
    },
    {
      "cve": "CVE-2023-24999",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-24999"
    },
    {
      "cve": "CVE-2023-25000",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-25000"
    },
    {
      "cve": "CVE-2023-25136",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-25136"
    }
  ]
}
  WID-SEC-W-2023-1542
Vulnerability from csaf_certbund
Published
2023-06-22 22:00
    Modified
2025-10-23 22:00
    Summary
Red Hat OpenShift: Mehrere Schwachstellen
    Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
    Produktbeschreibung
Red Hat OpenShift ist eine "Platform as a Service" (PaaS) Lösung zur Bereitstellung von Applikationen in der Cloud.
    Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Zustand herbeizuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
    Betroffene Betriebssysteme
- Linux
    {
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-1542 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1542.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-1542 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1542"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3742 vom 2023-06-22",
        "url": "https://access.redhat.com/errata/RHSA-2023:3742"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3612 vom 2023-06-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:3614"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3615 vom 2023-06-22",
        "url": "https://access.redhat.com/errata/RHSA-2023:3615"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3613 vom 2023-06-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:3613"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory vom 2023-06-29",
        "url": "https://access.redhat.com/errata/RHSA-2023:3918"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3943 vom 2023-06-29",
        "url": "https://access.redhat.com/errata/RHSA-2023:3943"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3910 vom 2023-07-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:3910"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3915 vom 2023-07-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:3915"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:3925 vom 2023-07-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:3925"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4003 vom 2023-07-10",
        "url": "https://access.redhat.com/errata/RHSA-2023:4003"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-6CFE7492C1 vom 2023-07-16",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-6cfe7492c1"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-AA7C75ED4A vom 2023-07-16",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-aa7c75ed4a"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4025 vom 2023-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:4025"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4112 vom 2023-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:4112"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4113 vom 2023-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:4113"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4114 vom 2023-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:4114"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4053 vom 2023-07-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:4053"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4204 vom 2023-07-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:4204"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4090 vom 2023-07-21",
        "url": "https://access.redhat.com/errata/RHSA-2023:4090"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4241 vom 2023-07-21",
        "url": "https://access.redhat.com/errata/RHSA-2023:4241"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4238 vom 2023-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:4238"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4093 vom 2023-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:4093"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4091 vom 2023-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:4091"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4225 vom 2023-07-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:4225"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4226 vom 2023-07-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:4226"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4470 vom 2023-08-03",
        "url": "https://access.redhat.com/errata/RHSA-2023:4470"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4335 vom 2023-08-08",
        "url": "https://access.redhat.com/errata/RHSA-2023:4335"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4674 vom 2023-08-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:4674"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:4983 vom 2023-09-05",
        "url": "https://access.redhat.com/errata/RHSA-2023:4983"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5103 vom 2023-09-12",
        "url": "https://access.redhat.com/errata/RHSA-2023:5103"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5233 vom 2023-09-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5233"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5314 vom 2023-09-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:5314"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6316 vom 2023-11-07",
        "url": "https://access.redhat.com/errata/RHSA-2023:6316"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7058 vom 2023-11-15",
        "url": "https://access.redhat.com/errata/RHSA-2023:7058"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-6939 vom 2023-11-21",
        "url": "https://linux.oracle.com/errata/ELSA-2023-6939.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-14A33318B8 vom 2023-12-03",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-14a33318b8"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7672 vom 2023-12-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:7672"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7820 vom 2023-12-14",
        "url": "https://access.redhat.com/errata/RHSA-2023:7820"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5006 vom 2023-12-30",
        "url": "https://access.redhat.com/errata/RHSA-2023:5006"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7823 vom 2024-01-05",
        "url": "https://access.redhat.com/errata/RHSA-2023:7823"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0139 vom 2024-01-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:0139"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0143 vom 2024-01-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:0143"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0137 vom 2024-01-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:0137"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0121 vom 2024-01-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:0121"
      },
      {
        "category": "external",
        "summary": "Meinberg Security Advisory",
        "url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2024-01-lantime-firmware-v7-08-007.htm"
      },
      {
        "category": "external",
        "summary": "Gentoo Linux Security Advisory GLSA-202405-04 vom 2024-05-04",
        "url": "https://security.gentoo.org/glsa/202405-04"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2987 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:2987"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3254 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:3254"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:4631 vom 2024-07-18",
        "url": "https://access.redhat.com/errata/RHSA-2024:4631"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19094 vom 2025-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2025:19094"
      }
    ],
    "source_lang": "en-US",
    "title": "Red Hat OpenShift: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-10-23T22:00:00.000+00:00",
      "generator": {
        "date": "2025-10-24T08:33:28.970+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2023-1542",
      "initial_release_date": "2023-06-22T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2023-06-22T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2023-06-25T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-06-26T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-06-28T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-06-29T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-05T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-06T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-10T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-16T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2023-07-17T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-18T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-20T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-07-26T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-08-03T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-08-07T22:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-08-23T22:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-09-05T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-09-12T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-09-19T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-09-20T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-07T23:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-14T23:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-21T23:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2023-12-03T23:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2023-12-06T23:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-12-13T23:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-01T23:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-04T23:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-10T23:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-30T23:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Meinberg aufgenommen"
        },
        {
          "date": "2024-05-05T22:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von Gentoo aufgenommen"
        },
        {
          "date": "2024-05-21T22:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-07-18T22:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-10-23T22:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "34"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.08.007",
                "product": {
                  "name": "Meinberg LANTIME \u003c7.08.007",
                  "product_id": "T032435"
                }
              },
              {
                "category": "product_version",
                "name": "7.08.007",
                "product": {
                  "name": "Meinberg LANTIME 7.08.007",
                  "product_id": "T032435-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:meinberg:lantime:7.08.007"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "LANTIME"
          }
        ],
        "category": "vendor",
        "name": "Meinberg"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "67646",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Advanced Cluster Security for Kubernetes 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Advanced Cluster Security for Kubernetes 4",
                  "product_id": "T027916",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security_for_kubernetes_4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Service Interconnect 1",
                "product": {
                  "name": "Red Hat Enterprise Linux Service Interconnect 1",
                  "product_id": "T028472",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:service_interconnect_1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift",
                "product": {
                  "name": "Red Hat OpenShift",
                  "product_id": "T008027",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:-"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.12",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.12",
                  "product_id": "T026435",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform_4.12"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.13.4",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.13.4",
                  "product_id": "T028225"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.13.4",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.13.4",
                  "product_id": "T028225-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.13.4"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Data Foundation \u003c4.13.0",
                "product": {
                  "name": "Red Hat OpenShift Data Foundation \u003c4.13.0",
                  "product_id": "T028289"
                }
              },
              {
                "category": "product_version",
                "name": "Data Foundation 4.13.0",
                "product": {
                  "name": "Red Hat OpenShift Data Foundation 4.13.0",
                  "product_id": "T028289-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:data_foundation_4.13.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.12.22",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.12.22",
                  "product_id": "T028307"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.12.22",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.12.22",
                  "product_id": "T028307-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.22"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.11.44",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.11.44",
                  "product_id": "T028416"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.11.44",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.11.44",
                  "product_id": "T028416-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.11.44"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Data Foundation \u003c4.12.10",
                "product": {
                  "name": "Red Hat OpenShift Data Foundation \u003c4.12.10",
                  "product_id": "T031698"
                }
              },
              {
                "category": "product_version",
                "name": "Data Foundation 4.12.10",
                "product": {
                  "name": "Red Hat OpenShift Data Foundation 4.12.10",
                  "product_id": "T031698-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:data_foundation__4.12.10"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.14.0",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.14.0",
                  "product_id": "T031839"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.14.0",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.14.0",
                  "product_id": "T031839-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.12.46",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.12.46",
                  "product_id": "T031870"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.12.46",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.12.46",
                  "product_id": "T031870-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.46"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OpenShift"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-20107",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2015-20107"
    },
    {
      "cve": "CVE-2018-25032",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2018-25032"
    },
    {
      "cve": "CVE-2020-10735",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2020-10735"
    },
    {
      "cve": "CVE-2020-16250",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2020-16250"
    },
    {
      "cve": "CVE-2020-16251",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2020-16251"
    },
    {
      "cve": "CVE-2020-17049",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2020-17049"
    },
    {
      "cve": "CVE-2021-28861",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-28861"
    },
    {
      "cve": "CVE-2021-3765",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-3765"
    },
    {
      "cve": "CVE-2021-3807",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-3807"
    },
    {
      "cve": "CVE-2021-4231",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-4231"
    },
    {
      "cve": "CVE-2021-4235",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-4235"
    },
    {
      "cve": "CVE-2021-4238",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-4238"
    },
    {
      "cve": "CVE-2021-43519",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-43519"
    },
    {
      "cve": "CVE-2021-43998",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-43998"
    },
    {
      "cve": "CVE-2021-44531",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-44531"
    },
    {
      "cve": "CVE-2021-44532",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-44532"
    },
    {
      "cve": "CVE-2021-44533",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-44533"
    },
    {
      "cve": "CVE-2021-44964",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-44964"
    },
    {
      "cve": "CVE-2021-46828",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-46828"
    },
    {
      "cve": "CVE-2021-46848",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2021-46848"
    },
    {
      "cve": "CVE-2022-0670",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-0670"
    },
    {
      "cve": "CVE-2022-1271",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1271"
    },
    {
      "cve": "CVE-2022-1304",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1304"
    },
    {
      "cve": "CVE-2022-1348",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1348"
    },
    {
      "cve": "CVE-2022-1586",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1586"
    },
    {
      "cve": "CVE-2022-1587",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-1587"
    },
    {
      "cve": "CVE-2022-21824",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-21824"
    },
    {
      "cve": "CVE-2022-2309",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2309"
    },
    {
      "cve": "CVE-2022-23540",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-23540"
    },
    {
      "cve": "CVE-2022-23541",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-23541"
    },
    {
      "cve": "CVE-2022-24903",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-24903"
    },
    {
      "cve": "CVE-2022-2509",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2509"
    },
    {
      "cve": "CVE-2022-26280",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-26280"
    },
    {
      "cve": "CVE-2022-27664",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-27664"
    },
    {
      "cve": "CVE-2022-2795",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2795"
    },
    {
      "cve": "CVE-2022-2879",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2879"
    },
    {
      "cve": "CVE-2022-2880",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-2880"
    },
    {
      "cve": "CVE-2022-28805",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-28805"
    },
    {
      "cve": "CVE-2022-29154",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-29154"
    },
    {
      "cve": "CVE-2022-30635",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-30635"
    },
    {
      "cve": "CVE-2022-3094",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3094"
    },
    {
      "cve": "CVE-2022-31129",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-31129"
    },
    {
      "cve": "CVE-2022-32189",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-32189"
    },
    {
      "cve": "CVE-2022-32190",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-32190"
    },
    {
      "cve": "CVE-2022-33099",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-33099"
    },
    {
      "cve": "CVE-2022-3358",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3358"
    },
    {
      "cve": "CVE-2022-34903",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-34903"
    },
    {
      "cve": "CVE-2022-3515",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3515"
    },
    {
      "cve": "CVE-2022-3517",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3517"
    },
    {
      "cve": "CVE-2022-35737",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-35737"
    },
    {
      "cve": "CVE-2022-36227",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-36227"
    },
    {
      "cve": "CVE-2022-3715",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3715"
    },
    {
      "cve": "CVE-2022-3736",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3736"
    },
    {
      "cve": "CVE-2022-37434",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-37434"
    },
    {
      "cve": "CVE-2022-38149",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-38149"
    },
    {
      "cve": "CVE-2022-3821",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3821"
    },
    {
      "cve": "CVE-2022-38900",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-38900"
    },
    {
      "cve": "CVE-2022-3924",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-3924"
    },
    {
      "cve": "CVE-2022-40023",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-40023"
    },
    {
      "cve": "CVE-2022-40303",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-40303"
    },
    {
      "cve": "CVE-2022-40304",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-40304"
    },
    {
      "cve": "CVE-2022-40897",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-40897"
    },
    {
      "cve": "CVE-2022-41316",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41316"
    },
    {
      "cve": "CVE-2022-41715",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41715"
    },
    {
      "cve": "CVE-2022-41717",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41717"
    },
    {
      "cve": "CVE-2022-41723",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41723"
    },
    {
      "cve": "CVE-2022-41724",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41724"
    },
    {
      "cve": "CVE-2022-41725",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-41725"
    },
    {
      "cve": "CVE-2022-42010",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42010"
    },
    {
      "cve": "CVE-2022-42011",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42011"
    },
    {
      "cve": "CVE-2022-42012",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42012"
    },
    {
      "cve": "CVE-2022-42898",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42898"
    },
    {
      "cve": "CVE-2022-42919",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-42919"
    },
    {
      "cve": "CVE-2022-43680",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-43680"
    },
    {
      "cve": "CVE-2022-4415",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-4415"
    },
    {
      "cve": "CVE-2022-45061",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-45061"
    },
    {
      "cve": "CVE-2022-45873",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-45873"
    },
    {
      "cve": "CVE-2022-46175",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-46175"
    },
    {
      "cve": "CVE-2022-47024",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-47024"
    },
    {
      "cve": "CVE-2022-47629",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-47629"
    },
    {
      "cve": "CVE-2022-48303",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-48303"
    },
    {
      "cve": "CVE-2022-48337",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-48337"
    },
    {
      "cve": "CVE-2022-48338",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-48338"
    },
    {
      "cve": "CVE-2022-48339",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2022-48339"
    },
    {
      "cve": "CVE-2023-0361",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-0361"
    },
    {
      "cve": "CVE-2023-0620",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-0620"
    },
    {
      "cve": "CVE-2023-0665",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-0665"
    },
    {
      "cve": "CVE-2023-22809",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-22809"
    },
    {
      "cve": "CVE-2023-24329",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-24329"
    },
    {
      "cve": "CVE-2023-2491",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-2491"
    },
    {
      "cve": "CVE-2023-24999",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-24999"
    },
    {
      "cve": "CVE-2023-25000",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-25000"
    },
    {
      "cve": "CVE-2023-25136",
      "product_status": {
        "known_affected": [
          "T032435",
          "T031698",
          "T008027",
          "T028472",
          "67646",
          "T012167",
          "T004914",
          "74185",
          "T031870",
          "T027916",
          "T028307",
          "T028416",
          "T026435",
          "T028225",
          "T031839",
          "T028289"
        ]
      },
      "release_date": "2023-06-22T22:00:00.000+00:00",
      "title": "CVE-2023-25136"
    }
  ]
}
  WID-SEC-W-2023-0522
Vulnerability from csaf_certbund
Published
2023-02-28 23:00
    Modified
2023-03-14 23:00
    Summary
Red Hat Enterprise Linux (lua): Mehrere Schwachstellen
    Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
    Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
    Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Denial of Service Angriff durchzuführen oder Sicherheitsvorkehrungen zu umgehen.
    Betroffene Betriebssysteme
- Linux
    {
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-0522 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0522.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-0522 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0522"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:1211 vom 2023-03-14",
        "url": "https://access.redhat.com/errata/RHSA-2023:1211"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory vom 2023-02-28",
        "url": "https://access.redhat.com/errata/RHSA-2023:0957"
      }
    ],
    "source_lang": "en-US",
    "title": "Red Hat Enterprise Linux (lua): Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2023-03-14T23:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:45:46.979+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2023-0522",
      "initial_release_date": "2023-02-28T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2023-02-28T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2023-03-14T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "67646",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux lua",
                "product": {
                  "name": "Red Hat Enterprise Linux lua",
                  "product_id": "T026559",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:lua"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-44964",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux. Diese ist auf einen Fehler in der Komponente \"lua\" zur\u00fcckzuf\u00fchren. Ein malizi\u00f6ses Skript kann im Lua Interpreter ausgef\u00fchrt werden, in Folge kann aus der Sandbox ausgebrochen werden. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T026559",
          "67646"
        ]
      },
      "release_date": "2023-02-28T23:00:00.000+00:00",
      "title": "CVE-2021-44964"
    },
    {
      "cve": "CVE-2021-43519",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux. Diese besteht in der Komponente \"lua\" und ist auf einen stapelbasierten Puffer\u00fcberlauf zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T026559",
          "67646"
        ]
      },
      "release_date": "2023-02-28T23:00:00.000+00:00",
      "title": "CVE-2021-43519"
    }
  ]
}
  wid-sec-w-2023-0522
Vulnerability from csaf_certbund
Published
2023-02-28 23:00
    Modified
2023-03-14 23:00
    Summary
Red Hat Enterprise Linux (lua): Mehrere Schwachstellen
    Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
    Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
    Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Denial of Service Angriff durchzuführen oder Sicherheitsvorkehrungen zu umgehen.
    Betroffene Betriebssysteme
- Linux
    {
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-0522 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0522.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-0522 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0522"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:1211 vom 2023-03-14",
        "url": "https://access.redhat.com/errata/RHSA-2023:1211"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory vom 2023-02-28",
        "url": "https://access.redhat.com/errata/RHSA-2023:0957"
      }
    ],
    "source_lang": "en-US",
    "title": "Red Hat Enterprise Linux (lua): Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2023-03-14T23:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:45:46.979+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2023-0522",
      "initial_release_date": "2023-02-28T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2023-02-28T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2023-03-14T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "67646",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux lua",
                "product": {
                  "name": "Red Hat Enterprise Linux lua",
                  "product_id": "T026559",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:lua"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-44964",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux. Diese ist auf einen Fehler in der Komponente \"lua\" zur\u00fcckzuf\u00fchren. Ein malizi\u00f6ses Skript kann im Lua Interpreter ausgef\u00fchrt werden, in Folge kann aus der Sandbox ausgebrochen werden. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T026559",
          "67646"
        ]
      },
      "release_date": "2023-02-28T23:00:00.000+00:00",
      "title": "CVE-2021-44964"
    },
    {
      "cve": "CVE-2021-43519",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux. Diese besteht in der Komponente \"lua\" und ist auf einen stapelbasierten Puffer\u00fcberlauf zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T026559",
          "67646"
        ]
      },
      "release_date": "2023-02-28T23:00:00.000+00:00",
      "title": "CVE-2021-43519"
    }
  ]
}
  ghsa-rvj2-9p3c-wmwh
Vulnerability from github
Published
2022-03-15 00:00
    Modified
2022-03-22 00:00
    
        Severity ?
      
      
    
        VLAI Severity ?
      
      Details
Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.
{
  "affected": [],
  "aliases": [
    "CVE-2021-44964"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-416"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2022-03-14T15:15:00Z",
    "severity": "MODERATE"
  },
  "details": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.",
  "id": "GHSA-rvj2-9p3c-wmwh",
  "modified": "2022-03-22T00:00:53Z",
  "published": "2022-03-15T00:00:58Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964"
    },
    {
      "type": "WEB",
      "url": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability"
    },
    {
      "type": "WEB",
      "url": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html"
    },
    {
      "type": "WEB",
      "url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
    },
    {
      "type": "WEB",
      "url": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html"
    },
    {
      "type": "WEB",
      "url": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  RHSA-2023:0957
Vulnerability from csaf_redhat
Published
2023-02-28 08:22
    Modified
2025-10-09 21:49
    Summary
Red Hat Security Advisory: lua security update
    Notes
Topic
An update for lua is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: use after free allows Sandbox Escape (CVE-2021-44964)
* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for lua is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.\n\nSecurity Fix(es):\n\n* lua: use after free allows Sandbox Escape (CVE-2021-44964)\n\n* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:0957",
        "url": "https://access.redhat.com/errata/RHSA-2023:0957"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2047672",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
      },
      {
        "category": "external",
        "summary": "2064772",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0957.json"
      }
    ],
    "title": "Red Hat Security Advisory: lua security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:49:01+00:00",
      "generator": {
        "date": "2025-10-09T21:49:01+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2023:0957",
      "initial_release_date": "2023-02-28T08:22:18+00:00",
      "revision_history": [
        {
          "date": "2023-02-28T08:22:18+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-02-28T08:22:18+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:49:01+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.1.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                  "product_id": "BaseOS-9.1.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 9)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 9)",
                  "product_id": "CRB-9.1.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.src",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.src",
                  "product_id": "lua-0:5.4.4-2.el9_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-libs-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-libs-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-devel-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-devel-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-libs-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-libs-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-debugsource-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-devel-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-devel-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-libs-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-libs-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-devel-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-devel-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-libs-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-libs-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-devel-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-devel-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.src",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.src",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.src",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-43519",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-01-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2047672"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack overflow issue was discovered in Lua in the lua_resume() function of \u0027ldo.c\u0027. This flaw allows a local attacker to pass a specially crafted file to the Lua Interpreter, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability does not affect Red Hat Enterprise Linux 8, because code-base was completely rewritten between 5.3 and 5.4. So, RHEL-8 is unlikely to be affected by this or a similar issue.\n\nThis flaw is marked as Out-of-Support-Scope for Red Hat Enterprise Linux 6 and 7 because the flaw impact is moderate. For additional information, refer to the Red Hat Enterprise Linux Life Cycle \u0026 Update Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-43519"
        },
        {
          "category": "external",
          "summary": "RHBZ#2047672",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43519",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-43519"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519"
        }
      ],
      "release_date": "2021-11-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-02-28T08:22:18+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:0957"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file"
    },
    {
      "cve": "CVE-2021-44964",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-03-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064772"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Lua interpreter. This flaw allows an attacker who can have a malicious script executed by the interpreter, to cause a use-after-free issue that may result in a sandbox escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "lua: use after free allows Sandbox Escape",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw does not affect versions of Lua shipped with Red Hat Enterprise Linux 6, 7, or 8; the vulnerable code was introduced in a subsequent version of Lua.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064772",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44964",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html",
          "url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://www.lua.org/bugs.html#5.4.4-1",
          "url": "https://www.lua.org/bugs.html#5.4.4-1"
        }
      ],
      "release_date": "2021-11-29T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-02-28T08:22:18+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:0957"
        },
        {
          "category": "workaround",
          "details": "Ensure that the Lua interpreter runs only trusted scripts.",
          "product_ids": [
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "lua: use after free allows Sandbox Escape"
    }
  ]
}
  rhsa-2023:0957
Vulnerability from csaf_redhat
Published
2023-02-28 08:22
    Modified
2025-10-09 21:49
    Summary
Red Hat Security Advisory: lua security update
    Notes
Topic
An update for lua is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: use after free allows Sandbox Escape (CVE-2021-44964)
* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for lua is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.\n\nSecurity Fix(es):\n\n* lua: use after free allows Sandbox Escape (CVE-2021-44964)\n\n* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:0957",
        "url": "https://access.redhat.com/errata/RHSA-2023:0957"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2047672",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
      },
      {
        "category": "external",
        "summary": "2064772",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0957.json"
      }
    ],
    "title": "Red Hat Security Advisory: lua security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:49:01+00:00",
      "generator": {
        "date": "2025-10-09T21:49:01+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2023:0957",
      "initial_release_date": "2023-02-28T08:22:18+00:00",
      "revision_history": [
        {
          "date": "2023-02-28T08:22:18+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-02-28T08:22:18+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:49:01+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.1.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                  "product_id": "BaseOS-9.1.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 9)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 9)",
                  "product_id": "CRB-9.1.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.src",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.src",
                  "product_id": "lua-0:5.4.4-2.el9_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-libs-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-libs-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-devel-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-devel-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-libs-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-libs-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-debugsource-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-devel-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-devel-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-libs-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-libs-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-devel-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-devel-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-libs-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-libs-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-devel-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-devel-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.src",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.src",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.src",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-43519",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-01-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2047672"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack overflow issue was discovered in Lua in the lua_resume() function of \u0027ldo.c\u0027. This flaw allows a local attacker to pass a specially crafted file to the Lua Interpreter, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability does not affect Red Hat Enterprise Linux 8, because code-base was completely rewritten between 5.3 and 5.4. So, RHEL-8 is unlikely to be affected by this or a similar issue.\n\nThis flaw is marked as Out-of-Support-Scope for Red Hat Enterprise Linux 6 and 7 because the flaw impact is moderate. For additional information, refer to the Red Hat Enterprise Linux Life Cycle \u0026 Update Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-43519"
        },
        {
          "category": "external",
          "summary": "RHBZ#2047672",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43519",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-43519"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519"
        }
      ],
      "release_date": "2021-11-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-02-28T08:22:18+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:0957"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file"
    },
    {
      "cve": "CVE-2021-44964",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-03-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064772"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Lua interpreter. This flaw allows an attacker who can have a malicious script executed by the interpreter, to cause a use-after-free issue that may result in a sandbox escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "lua: use after free allows Sandbox Escape",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw does not affect versions of Lua shipped with Red Hat Enterprise Linux 6, 7, or 8; the vulnerable code was introduced in a subsequent version of Lua.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064772",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44964",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html",
          "url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://www.lua.org/bugs.html#5.4.4-1",
          "url": "https://www.lua.org/bugs.html#5.4.4-1"
        }
      ],
      "release_date": "2021-11-29T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-02-28T08:22:18+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:0957"
        },
        {
          "category": "workaround",
          "details": "Ensure that the Lua interpreter runs only trusted scripts.",
          "product_ids": [
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "lua: use after free allows Sandbox Escape"
    }
  ]
}
  rhsa-2023_0957
Vulnerability from csaf_redhat
Published
2023-02-28 08:22
    Modified
2024-11-22 22:01
    Summary
Red Hat Security Advisory: lua security update
    Notes
Topic
An update for lua is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: use after free allows Sandbox Escape (CVE-2021-44964)
* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for lua is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.\n\nSecurity Fix(es):\n\n* lua: use after free allows Sandbox Escape (CVE-2021-44964)\n\n* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:0957",
        "url": "https://access.redhat.com/errata/RHSA-2023:0957"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2047672",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
      },
      {
        "category": "external",
        "summary": "2064772",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0957.json"
      }
    ],
    "title": "Red Hat Security Advisory: lua security update",
    "tracking": {
      "current_release_date": "2024-11-22T22:01:26+00:00",
      "generator": {
        "date": "2024-11-22T22:01:26+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2023:0957",
      "initial_release_date": "2023-02-28T08:22:18+00:00",
      "revision_history": [
        {
          "date": "2023-02-28T08:22:18+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-02-28T08:22:18+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T22:01:26+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.1.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                  "product_id": "BaseOS-9.1.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 9)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 9)",
                  "product_id": "CRB-9.1.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.src",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.src",
                  "product_id": "lua-0:5.4.4-2.el9_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-libs-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-libs-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-devel-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-devel-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.aarch64",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.aarch64",
                  "product_id": "lua-0:5.4.4-2.el9_1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.ppc64le",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.ppc64le",
                  "product_id": "lua-0:5.4.4-2.el9_1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-libs-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-libs-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-debugsource-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-2.el9_1.i686",
                "product": {
                  "name": "lua-devel-0:5.4.4-2.el9_1.i686",
                  "product_id": "lua-devel-0:5.4.4-2.el9_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-libs-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-libs-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-devel-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-devel-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.x86_64",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.x86_64",
                  "product_id": "lua-0:5.4.4-2.el9_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-libs-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-libs-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-devel-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-devel-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-2.el9_1.s390x",
                "product": {
                  "name": "lua-0:5.4.4-2.el9_1.s390x",
                  "product_id": "lua-0:5.4.4-2.el9_1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.src",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.src",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.src",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-43519",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-01-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2047672"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack overflow issue was discovered in Lua in the lua_resume() function of \u0027ldo.c\u0027. This flaw allows a local attacker to pass a specially crafted file to the Lua Interpreter, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability does not affect Red Hat Enterprise Linux 8, because code-base was completely rewritten between 5.3 and 5.4. So, RHEL-8 is unlikely to be affected by this or a similar issue.\n\nThis flaw is marked as Out-of-Support-Scope for Red Hat Enterprise Linux 6 and 7 because the flaw impact is moderate. For additional information, refer to the Red Hat Enterprise Linux Life Cycle \u0026 Update Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-43519"
        },
        {
          "category": "external",
          "summary": "RHBZ#2047672",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43519",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-43519"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519"
        }
      ],
      "release_date": "2021-11-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-02-28T08:22:18+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:0957"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file"
    },
    {
      "cve": "CVE-2021-44964",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-03-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064772"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Lua interpreter. This flaw allows an attacker who can have a malicious script executed by the interpreter, to cause a use-after-free issue that may result in a sandbox escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "lua: use after free allows Sandbox Escape",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw does not affect versions of Lua shipped with Red Hat Enterprise Linux 6, 7, or 8; the vulnerable code was introduced in a subsequent version of Lua.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
          "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
          "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064772",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44964",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html",
          "url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://www.lua.org/bugs.html#5.4.4-1",
          "url": "https://www.lua.org/bugs.html#5.4.4-1"
        }
      ],
      "release_date": "2021-11-29T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-02-28T08:22:18+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:0957"
        },
        {
          "category": "workaround",
          "details": "Ensure that the Lua interpreter runs only trusted scripts.",
          "product_ids": [
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
            "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
            "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "lua: use after free allows Sandbox Escape"
    }
  ]
}
  rhsa-2023:1211
Vulnerability from csaf_redhat
Published
2023-03-14 14:00
    Modified
2025-10-09 21:49
    Summary
Red Hat Security Advisory: lua security update
    Notes
Topic
An update for lua is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
The following packages have been upgraded to a later upstream version: lua (5.4.4).
Security Fix(es):
* lua: use after free allows Sandbox Escape (CVE-2021-44964)
* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for lua is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.\n\nThe following packages have been upgraded to a later upstream version: lua (5.4.4).\n\nSecurity Fix(es):\n\n* lua: use after free allows Sandbox Escape (CVE-2021-44964)\n\n* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:1211",
        "url": "https://access.redhat.com/errata/RHSA-2023:1211"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2047672",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
      },
      {
        "category": "external",
        "summary": "2064772",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1211.json"
      }
    ],
    "title": "Red Hat Security Advisory: lua security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:49:02+00:00",
      "generator": {
        "date": "2025-10-09T21:49:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2023:1211",
      "initial_release_date": "2023-03-14T14:00:18+00:00",
      "revision_history": [
        {
          "date": "2023-03-14T14:00:18+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-03-14T14:00:18+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:49:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
                  "product_id": "AppStream-9.0.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
                  "product_id": "BaseOS-9.0.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:9.0::baseos"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
                  "product_id": "CRB-9.0.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.0::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.src",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.src",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-libs-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-libs-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-devel-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-devel-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.src",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.src",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.src",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-43519",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-01-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2047672"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack overflow issue was discovered in Lua in the lua_resume() function of \u0027ldo.c\u0027. This flaw allows a local attacker to pass a specially crafted file to the Lua Interpreter, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability does not affect Red Hat Enterprise Linux 8, because code-base was completely rewritten between 5.3 and 5.4. So, RHEL-8 is unlikely to be affected by this or a similar issue.\n\nThis flaw is marked as Out-of-Support-Scope for Red Hat Enterprise Linux 6 and 7 because the flaw impact is moderate. For additional information, refer to the Red Hat Enterprise Linux Life Cycle \u0026 Update Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-43519"
        },
        {
          "category": "external",
          "summary": "RHBZ#2047672",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43519",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-43519"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519"
        }
      ],
      "release_date": "2021-11-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-03-14T14:00:18+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:1211"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file"
    },
    {
      "cve": "CVE-2021-44964",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-03-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064772"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Lua interpreter. This flaw allows an attacker who can have a malicious script executed by the interpreter, to cause a use-after-free issue that may result in a sandbox escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "lua: use after free allows Sandbox Escape",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw does not affect versions of Lua shipped with Red Hat Enterprise Linux 6, 7, or 8; the vulnerable code was introduced in a subsequent version of Lua.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064772",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44964",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html",
          "url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://www.lua.org/bugs.html#5.4.4-1",
          "url": "https://www.lua.org/bugs.html#5.4.4-1"
        }
      ],
      "release_date": "2021-11-29T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-03-14T14:00:18+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:1211"
        },
        {
          "category": "workaround",
          "details": "Ensure that the Lua interpreter runs only trusted scripts.",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "lua: use after free allows Sandbox Escape"
    }
  ]
}
  rhsa-2023_1211
Vulnerability from csaf_redhat
Published
2023-03-14 14:00
    Modified
2024-11-22 22:01
    Summary
Red Hat Security Advisory: lua security update
    Notes
Topic
An update for lua is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
The following packages have been upgraded to a later upstream version: lua (5.4.4).
Security Fix(es):
* lua: use after free allows Sandbox Escape (CVE-2021-44964)
* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for lua is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.\n\nThe following packages have been upgraded to a later upstream version: lua (5.4.4).\n\nSecurity Fix(es):\n\n* lua: use after free allows Sandbox Escape (CVE-2021-44964)\n\n* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:1211",
        "url": "https://access.redhat.com/errata/RHSA-2023:1211"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2047672",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
      },
      {
        "category": "external",
        "summary": "2064772",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1211.json"
      }
    ],
    "title": "Red Hat Security Advisory: lua security update",
    "tracking": {
      "current_release_date": "2024-11-22T22:01:36+00:00",
      "generator": {
        "date": "2024-11-22T22:01:36+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2023:1211",
      "initial_release_date": "2023-03-14T14:00:18+00:00",
      "revision_history": [
        {
          "date": "2023-03-14T14:00:18+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-03-14T14:00:18+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T22:01:36+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
                  "product_id": "AppStream-9.0.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
                  "product_id": "BaseOS-9.0.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:9.0::baseos"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
                  "product_id": "CRB-9.0.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.0::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.src",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.src",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-libs-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-libs-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-devel-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-devel-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.src",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.src",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.src",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-43519",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-01-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2047672"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack overflow issue was discovered in Lua in the lua_resume() function of \u0027ldo.c\u0027. This flaw allows a local attacker to pass a specially crafted file to the Lua Interpreter, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability does not affect Red Hat Enterprise Linux 8, because code-base was completely rewritten between 5.3 and 5.4. So, RHEL-8 is unlikely to be affected by this or a similar issue.\n\nThis flaw is marked as Out-of-Support-Scope for Red Hat Enterprise Linux 6 and 7 because the flaw impact is moderate. For additional information, refer to the Red Hat Enterprise Linux Life Cycle \u0026 Update Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-43519"
        },
        {
          "category": "external",
          "summary": "RHBZ#2047672",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43519",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-43519"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519"
        }
      ],
      "release_date": "2021-11-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-03-14T14:00:18+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:1211"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file"
    },
    {
      "cve": "CVE-2021-44964",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-03-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064772"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Lua interpreter. This flaw allows an attacker who can have a malicious script executed by the interpreter, to cause a use-after-free issue that may result in a sandbox escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "lua: use after free allows Sandbox Escape",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw does not affect versions of Lua shipped with Red Hat Enterprise Linux 6, 7, or 8; the vulnerable code was introduced in a subsequent version of Lua.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064772",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44964",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html",
          "url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://www.lua.org/bugs.html#5.4.4-1",
          "url": "https://www.lua.org/bugs.html#5.4.4-1"
        }
      ],
      "release_date": "2021-11-29T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-03-14T14:00:18+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:1211"
        },
        {
          "category": "workaround",
          "details": "Ensure that the Lua interpreter runs only trusted scripts.",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "lua: use after free allows Sandbox Escape"
    }
  ]
}
  RHSA-2023:1211
Vulnerability from csaf_redhat
Published
2023-03-14 14:00
    Modified
2025-10-09 21:49
    Summary
Red Hat Security Advisory: lua security update
    Notes
Topic
An update for lua is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
The following packages have been upgraded to a later upstream version: lua (5.4.4).
Security Fix(es):
* lua: use after free allows Sandbox Escape (CVE-2021-44964)
* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for lua is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.\n\nThe following packages have been upgraded to a later upstream version: lua (5.4.4).\n\nSecurity Fix(es):\n\n* lua: use after free allows Sandbox Escape (CVE-2021-44964)\n\n* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:1211",
        "url": "https://access.redhat.com/errata/RHSA-2023:1211"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2047672",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
      },
      {
        "category": "external",
        "summary": "2064772",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1211.json"
      }
    ],
    "title": "Red Hat Security Advisory: lua security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:49:02+00:00",
      "generator": {
        "date": "2025-10-09T21:49:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2023:1211",
      "initial_release_date": "2023-03-14T14:00:18+00:00",
      "revision_history": [
        {
          "date": "2023-03-14T14:00:18+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-03-14T14:00:18+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:49:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
                  "product_id": "AppStream-9.0.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
                  "product_id": "BaseOS-9.0.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:9.0::baseos"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
                  "product_id": "CRB-9.0.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.0::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
                "product": {
                  "name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
                  "product_id": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
                "product": {
                  "name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_id": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
                "product": {
                  "name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
                  "product_id": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
                "product": {
                  "name": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
                  "product_id": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.src",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.src",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "lua-libs-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-libs-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-libs-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "lua-devel-0:5.4.4-1.el9_0.1.i686",
                "product": {
                  "name": "lua-devel-0:5.4.4-1.el9_0.1.i686",
                  "product_id": "lua-devel-0:5.4.4-1.el9_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.src",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.src",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
          "product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.src",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
          "product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        },
        "product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
        "relates_to_product_reference": "CRB-9.0.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-43519",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-01-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2047672"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack overflow issue was discovered in Lua in the lua_resume() function of \u0027ldo.c\u0027. This flaw allows a local attacker to pass a specially crafted file to the Lua Interpreter, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability does not affect Red Hat Enterprise Linux 8, because code-base was completely rewritten between 5.3 and 5.4. So, RHEL-8 is unlikely to be affected by this or a similar issue.\n\nThis flaw is marked as Out-of-Support-Scope for Red Hat Enterprise Linux 6 and 7 because the flaw impact is moderate. For additional information, refer to the Red Hat Enterprise Linux Life Cycle \u0026 Update Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-43519"
        },
        {
          "category": "external",
          "summary": "RHBZ#2047672",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43519",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-43519"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519"
        }
      ],
      "release_date": "2021-11-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-03-14T14:00:18+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:1211"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file"
    },
    {
      "cve": "CVE-2021-44964",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-03-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064772"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Lua interpreter. This flaw allows an attacker who can have a malicious script executed by the interpreter, to cause a use-after-free issue that may result in a sandbox escape.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "lua: use after free allows Sandbox Escape",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw does not affect versions of Lua shipped with Red Hat Enterprise Linux 6, 7, or 8; the vulnerable code was introduced in a subsequent version of Lua.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
          "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
          "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064772",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44964",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964"
        },
        {
          "category": "external",
          "summary": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html",
          "url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://www.lua.org/bugs.html#5.4.4-1",
          "url": "https://www.lua.org/bugs.html#5.4.4-1"
        }
      ],
      "release_date": "2021-11-29T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-03-14T14:00:18+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:1211"
        },
        {
          "category": "workaround",
          "details": "Ensure that the Lua interpreter runs only trusted scripts.",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
            "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
            "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "lua: use after free allows Sandbox Escape"
    }
  ]
}
  msrc_cve-2021-44964
Vulnerability from csaf_microsoft
Published
2022-03-02 00:00
    Modified
2025-07-11 00:00
    Summary
Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.
    Notes
Additional Resources
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
    Disclaimer
The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
    {
  "document": {
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2021-44964 Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file. - VEX",
        "url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2021-44964.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.",
    "tracking": {
      "current_release_date": "2025-07-11T00:00:00.000Z",
      "generator": {
        "date": "2025-10-19T23:23:33.133Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2021-44964",
      "initial_release_date": "2022-03-02T00:00:00.000Z",
      "revision_history": [
        {
          "date": "2022-03-21T00:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        },
        {
          "date": "2023-06-03T00:00:00.000Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Information published."
        },
        {
          "date": "2025-07-11T00:00:00.000Z",
          "legacy_version": "2",
          "number": "3",
          "summary": "Added memcached to CBL-Mariner 2.0\nAdded ntopng to CBL-Mariner 2.0\nAdded lua to CBL-Mariner 2.0"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "2.0",
                "product": {
                  "name": "CBL Mariner 2.0",
                  "product_id": "17086"
                }
              },
              {
                "category": "product_version",
                "name": "3.0",
                "product": {
                  "name": "Azure Linux 3.0",
                  "product_id": "17084"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 lua 5.4.4-1",
                "product": {
                  "name": "\u003ccbl2 lua 5.4.4-1",
                  "product_id": "3"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 lua 5.4.4-1",
                "product": {
                  "name": "cbl2 lua 5.4.4-1",
                  "product_id": "19468"
                }
              }
            ],
            "category": "product_name",
            "name": "lua"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 ntopng 5.2.1-3",
                "product": {
                  "name": "\u003ccbl2 ntopng 5.2.1-3",
                  "product_id": "2"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 ntopng 5.2.1-3",
                "product": {
                  "name": "cbl2 ntopng 5.2.1-3",
                  "product_id": "19878"
                }
              }
            ],
            "category": "product_name",
            "name": "ntopng"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 memcached 1.6.22-2",
                "product": {
                  "name": "\u003ccbl2 memcached 1.6.22-2",
                  "product_id": "1"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 memcached 1.6.22-2",
                "product": {
                  "name": "cbl2 memcached 1.6.22-2",
                  "product_id": "19882"
                }
              }
            ],
            "category": "product_name",
            "name": "memcached"
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 lua 5.4.4-1 as a component of CBL Mariner 2.0",
          "product_id": "17086-3"
        },
        "product_reference": "3",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 lua 5.4.4-1 as a component of CBL Mariner 2.0",
          "product_id": "19468-17086"
        },
        "product_reference": "19468",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 ntopng 5.2.1-3 as a component of CBL Mariner 2.0",
          "product_id": "17086-2"
        },
        "product_reference": "2",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 ntopng 5.2.1-3 as a component of CBL Mariner 2.0",
          "product_id": "19878-17086"
        },
        "product_reference": "19878",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 memcached 1.6.22-2 as a component of CBL Mariner 2.0",
          "product_id": "17086-1"
        },
        "product_reference": "1",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 memcached 1.6.22-2 as a component of CBL Mariner 2.0",
          "product_id": "19882-17086"
        },
        "product_reference": "19882",
        "relates_to_product_reference": "17086"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-44964",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "general",
          "text": "mitre",
          "title": "Assigning CNA"
        }
      ],
      "product_status": {
        "fixed": [
          "19468-17086",
          "19878-17086",
          "19882-17086"
        ],
        "known_affected": [
          "17086-3",
          "17086-2",
          "17086-1"
        ],
        "under_investigation": [
          "17084-5",
          "17084-4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-44964 Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file. - VEX",
          "url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2021-44964.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-03-21T00:00:00.000Z",
          "details": "5.4.4-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-3"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2022-03-21T00:00:00.000Z",
          "details": "5.2.1-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-2"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2022-03-21T00:00:00.000Z",
          "details": "1.6.22-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-1"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "environmentalsScore": 0.0,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "temporalScore": 6.3,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "17086-3",
            "17086-2",
            "17086-1"
          ]
        }
      ],
      "title": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file."
    }
  ]
}
  fkie_cve-2021-44964
Vulnerability from fkie_nvd
Published
2022-03-14 15:15
    Modified
2024-11-21 06:31
    
          Severity ?
        
        
    Summary
Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.
    References
      | URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://lua-users.org/lists/lua-l/2021-11/msg00186.html | Exploit, Mailing List, Technical Description, Vendor Advisory | |
| cve@mitre.org | http://lua-users.org/lists/lua-l/2021-12/msg00007.html | Exploit, Mailing List, Vendor Advisory | |
| cve@mitre.org | http://lua-users.org/lists/lua-l/2021-12/msg00015.html | Mailing List, Vendor Advisory | |
| cve@mitre.org | http://lua-users.org/lists/lua-l/2021-12/msg00030.html | Mailing List, Vendor Advisory | |
| cve@mitre.org | https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lua-users.org/lists/lua-l/2021-11/msg00186.html | Exploit, Mailing List, Technical Description, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lua-users.org/lists/lua-l/2021-12/msg00007.html | Exploit, Mailing List, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lua-users.org/lists/lua-l/2021-12/msg00015.html | Mailing List, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lua-users.org/lists/lua-l/2021-12/msg00030.html | Mailing List, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability | Exploit, Third Party Advisory | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lua:lua:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36E29101-6009-4A41-AF33-FDD5EA753F91",
              "versionEndIncluding": "5.4.3",
              "versionStartIncluding": "5.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file."
    },
    {
      "lang": "es",
      "value": "Un uso de memoria previamente liberada en el recolector de basura y en el finalizador de lgc.c en el int\u00e9rprete de Lua versiones 5.4.0~5.4.3, permite a atacantes llevar a cabo un Escape del Sandbox por medio de un archivo de script dise\u00f1ado"
    }
  ],
  "id": "CVE-2021-44964",
  "lastModified": "2024-11-21T06:31:44.853",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-14T15:15:09.373",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Mailing List",
        "Technical Description",
        "Vendor Advisory"
      ],
      "url": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Mailing List",
        "Vendor Advisory"
      ],
      "url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Vendor Advisory"
      ],
      "url": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Vendor Advisory"
      ],
      "url": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Technical Description",
        "Vendor Advisory"
      ],
      "url": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Vendor Advisory"
      ],
      "url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Vendor Advisory"
      ],
      "url": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Vendor Advisory"
      ],
      "url": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  gsd-2021-44964
Vulnerability from gsd
Modified
2023-12-13 01:23
      Details
        
          Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.
        
      Aliases
        
      Aliases
        
      {
  "GSD": {
    "alias": "CVE-2021-44964",
    "description": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.",
    "id": "GSD-2021-44964",
    "references": [
      "https://www.suse.com/security/cve/CVE-2021-44964.html",
      "https://access.redhat.com/errata/RHSA-2023:0957"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2021-44964"
      ],
      "details": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.",
      "id": "GSD-2021-44964",
      "modified": "2023-12-13T01:23:20.176608Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@mitre.org",
        "ID": "CVE-2021-44964",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html",
            "refsource": "MISC",
            "url": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html"
          },
          {
            "name": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html",
            "refsource": "MISC",
            "url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
          },
          {
            "name": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html",
            "refsource": "MISC",
            "url": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html"
          },
          {
            "name": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html",
            "refsource": "MISC",
            "url": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html"
          },
          {
            "name": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability",
            "refsource": "MISC",
            "url": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability"
          }
        ]
      }
    },
    "gitlab.com": {
      "advisories": [
        {
          "affected_range": "\u003e=5.4.0 \u003c=5.4.3",
          "affected_versions": "All versions starting from 5.4.0 up to 5.4.3",
          "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
          "cwe_ids": [
            "CWE-1035",
            "CWE-416",
            "CWE-937"
          ],
          "date": "2022-03-21",
          "description": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.",
          "fixed_versions": [
            "5.4.4"
          ],
          "identifier": "CVE-2021-44964",
          "identifiers": [
            "CVE-2021-44964"
          ],
          "not_impacted": "All versions before 5.4.0, all versions after 5.4.3",
          "package_slug": "conan/lua",
          "pubdate": "2022-03-14",
          "solution": "Upgrade to version 5.4.4 or above.",
          "title": "Use After Free",
          "urls": [
            "https://nvd.nist.gov/vuln/detail/CVE-2021-44964",
            "http://lua-users.org/lists/lua-l/2021-12/msg00030.html",
            "http://lua-users.org/lists/lua-l/2021-12/msg00015.html",
            "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability",
            "http://lua-users.org/lists/lua-l/2021-11/msg00186.html",
            "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
          ],
          "uuid": "5233bfcc-6728-4ce4-83ab-04492ed03352"
        }
      ]
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:lua:lua:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "5.4.3",
                "versionStartIncluding": "5.4.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-44964"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-416"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html",
              "refsource": "MISC",
              "tags": [
                "Mailing List",
                "Vendor Advisory"
              ],
              "url": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html"
            },
            {
              "name": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html",
              "refsource": "MISC",
              "tags": [
                "Mailing List",
                "Vendor Advisory"
              ],
              "url": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html"
            },
            {
              "name": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability",
              "refsource": "MISC",
              "tags": [
                "Exploit",
                "Third Party Advisory"
              ],
              "url": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability"
            },
            {
              "name": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html",
              "refsource": "MISC",
              "tags": [
                "Exploit",
                "Mailing List",
                "Technical Description",
                "Vendor Advisory"
              ],
              "url": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html"
            },
            {
              "name": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html",
              "refsource": "MISC",
              "tags": [
                "Exploit",
                "Mailing List",
                "Vendor Advisory"
              ],
              "url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "exploitabilityScore": 8.6,
          "impactScore": 2.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "MEDIUM",
          "userInteractionRequired": true
        },
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "exploitabilityScore": 1.8,
          "impactScore": 4.0
        }
      },
      "lastModifiedDate": "2022-03-21T05:17Z",
      "publishedDate": "2022-03-14T15:15Z"
    }
  }
}
  Loading…
      Loading…
      Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
      Loading…