Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-44793 (GCVE-0-2022-44793)
Vulnerability from cvelistv5
- n/a
URL | Tags | ||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:01:31.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/net-snmp/net-snmp/issues/475" }, { "tags": [ "x_transferred" ], "url": "https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f" }, { "name": "[debian-lts-announce] 20230115 [SECURITY] [DLA 3270-1] net-snmp security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230223-0011/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-44793", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T13:30:38.475099Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-05T16:12:07.945Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-23T00:00:00.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/net-snmp/net-snmp/issues/475" }, { "url": "https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f" }, { "name": "[debian-lts-announce] 20230115 [SECURITY] [DLA 3270-1] net-snmp security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html" }, { "url": "https://security.netapp.com/advisory/ntap-20230223-0011/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-44793", "datePublished": "2022-11-07T00:00:00.000Z", "dateReserved": "2022-11-07T00:00:00.000Z", "dateUpdated": "2025-05-05T16:12:07.945Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-44793\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-11-07T03:15:09.363\",\"lastModified\":\"2025-05-05T16:15:22.427\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.\"},{\"lang\":\"es\",\"value\":\"handle_ipv6IpForwarding en agent/mibgroup/ip-mib/ip_scalars.c en Net-SNMP 5.4.3 a 5.9.3 tiene un error de excepci\u00f3n de puntero NULL que puede ser utilizado por un atacante remoto para provocar que la instancia se bloquee a trav\u00e9s de un paquete UDP manipulado. resultando en Denegaci\u00f3n de Servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.4.3\",\"versionEndIncluding\":\"5.9.3\",\"matchCriteriaId\":\"97E267EC-2F41-4233-8647-3BE21B487713\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]}],\"references\":[{\"url\":\"https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/net-snmp/net-snmp/issues/475\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230223-0011/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/net-snmp/net-snmp/issues/475\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230223-0011/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/net-snmp/net-snmp/issues/475\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html\", \"name\": \"[debian-lts-announce] 20230115 [SECURITY] [DLA 3270-1] net-snmp security update\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230223-0011/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T14:01:31.174Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-44793\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-23T13:30:38.475099Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-476\", \"description\": \"CWE-476 NULL Pointer Dereference\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-05T13:07:50.714Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://github.com/net-snmp/net-snmp/issues/475\"}, {\"url\": \"https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html\", \"name\": \"[debian-lts-announce] 20230115 [SECURITY] [DLA 3270-1] net-snmp security update\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230223-0011/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2023-02-23T00:00:00.000Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2022-44793\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-05T16:12:07.945Z\", \"dateReserved\": \"2022-11-07T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2022-11-07T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
WID-SEC-W-2022-1996
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Net-SNMP ist eine Software-Suite zur Verwendung und Anwendung des SNMP (simple network management protocol) Protokolls. Sie unterst\u00fctzt IPv4, IPv6, IPX, AAL5, Unix domain sockets und andere Transportprotokolle. In der Suite sind eine Client-Bibliothek, eine Sammlung von Kommandozeilen-Tools, ein SNMP Agent sowie Perl- und Python-Module enthalten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Net-SNMP ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1996 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1996.json" }, { "category": "self", "summary": "WID-SEC-2022-1996 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1996" }, { "category": "external", "summary": "National Vulnerability Database - CVE-2022-44793 Detail vom 2022-11-08", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44793" }, { "category": "external", "summary": "PoC", "url": "https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5795-1 vom 2023-01-09", "url": "https://ubuntu.com/security/notices/USN-5795-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0068-1 vom 2023-01-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013454.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0075-1 vom 2023-01-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013464.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3270 vom 2023-01-15", "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5795-2 vom 2023-01-16", "url": "https://ubuntu.com/security/notices/USN-5795-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:2444 vom 2023-05-09", "url": "https://access.redhat.com/errata/RHSA-2023:2444" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:2969 vom 2023-05-16", "url": "https://access.redhat.com/errata/RHSA-2023:2969" }, { "category": "external", "summary": "Meinberg Security Advisory MBGSA-2023.03 vom 2023-05-23", "url": "https://www.meinbergglobal.com/english/news/meinberg-security-advisory-mbgsa-2023-03-lantime-firmware-v7-06-014.htm" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-2969 vom 2023-05-24", "url": "https://linux.oracle.com/errata/ELSA-2023-2969.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2402 vom 2024-01-10", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2402.html" } ], "source_lang": "en-US", "title": "Net-SNMP: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2024-01-09T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:37:48.537+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-1996", "initial_release_date": "2022-11-08T23:00:00.000+00:00", "revision_history": [ { "date": "2022-11-08T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-01-09T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-01-12T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-01-15T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-01-16T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-05-09T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-16T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-22T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Meinberg aufgenommen" }, { "date": "2023-05-23T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-01-09T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "11" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Meinberg LANTIME \u003c V7.06.014", "product": { "name": "Meinberg LANTIME \u003c V7.06.014", "product_id": "T027837", "product_identification_helper": { "cpe": "cpe:/h:meinberg:lantime:v7.06.014" } } } ], "category": "vendor", "name": "Meinberg" }, { "branches": [ { "category": "product_name", "name": "Open Source Net-SNMP \u003c= 5.9.3", "product": { "name": "Open Source Net-SNMP \u003c= 5.9.3", "product_id": "T025243", "product_identification_helper": { "cpe": "cpe:/a:net-snmp:net-snmp:5.8_-_5.9.3" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-44793", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Net-SNMP. Der Fehler besteht aufgrund eines NULL Pointer Exception Fehlers. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er ein manipuliertes UDP-Paket verwendet, um einen Denial-of-Service-Zustand auszul\u00f6sen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T027837", "T000126", "398363", "T004914" ], "last_affected": [ "T025243" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-44793" } ] }
wid-sec-w-2025-0225
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell PowerProtect Data Domain Appliances sind speziell f\u00fcr Backup und Daten-Deduplizierung ausgelegte Systeme.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um erh\u00f6hte Rechte zu erlangen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0225 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0225.json" }, { "category": "self", "summary": "WID-SEC-2025-0225 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0225" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-022 vom 2025-01-30", "url": "https://www.dell.com/support/kbdoc/de-de/000279157/dsa-2025-022-security-update-for-dell-powerprotect-dd-multiple-vulnerabilities" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2804 vom 2025-04-02", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2804.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09", "url": "https://ubuntu.com/security/notices/USN-7429-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09", "url": "https://ubuntu.com/security/notices/USN-7429-1" }, { "category": "external", "summary": "Security Update for Dell PowerProtect Data Domain", "url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities" } ], "source_lang": "en-US", "title": "Dell PowerProtect Data Domain: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-08-04T22:00:00.000+00:00", "generator": { "date": "2025-08-05T07:21:04.568+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-0225", "initial_release_date": "2025-01-30T23:00:00.000+00:00", "revision_history": [ { "date": "2025-01-30T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-04-01T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-04-09T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c8.3.0.0", "product": { "name": "Dell PowerProtect Data Domain \u003c8.3.0.0", "product_id": "T040718" } }, { "category": "product_version", "name": "8.3.0.0", "product": { "name": "Dell PowerProtect Data Domain 8.3.0.0", "product_id": "T040718-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.0.0" } } }, { "category": "product_version_range", "name": "\u003c7.13.1.20", "product": { "name": "Dell PowerProtect Data Domain \u003c7.13.1.20", "product_id": "T040719" } }, { "category": "product_version", "name": "7.13.1.20", "product": { "name": "Dell PowerProtect Data Domain 7.13.1.20", "product_id": "T040719-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.20" } } }, { "category": "product_version_range", "name": "\u003c7.10.1.50", "product": { "name": "Dell PowerProtect Data Domain \u003c7.10.1.50", "product_id": "T040721" } }, { "category": "product_version", "name": "7.10.1.50", "product": { "name": "Dell PowerProtect Data Domain 7.10.1.50", "product_id": "T040721-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.50" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain", "product": { "name": "Dell PowerProtect Data Domain", "product_id": "T045852", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:-" } } } ], "category": "product_name", "name": "PowerProtect Data Domain" }, { "category": "product_name", "name": "Dell PowerProtect Data Domain Management Center", "product": { "name": "Dell PowerProtect Data Domain Management Center", "product_id": "T045853", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain OS", "product": { "name": "Dell PowerProtect Data Domain OS", "product_id": "T045854", "product_identification_helper": { "cpe": "cpe:/o:dell:powerprotect_data_domain_os:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4235", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2013-4235" }, { "cve": "CVE-2015-8100", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2015-8100" }, { "cve": "CVE-2017-9271", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2017-9271" }, { "cve": "CVE-2018-6798", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2018-6798" }, { "cve": "CVE-2018-6913", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2018-6913" }, { "cve": "CVE-2019-20633", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2019-20633" }, { "cve": "CVE-2019-20892", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2019-20892" }, { "cve": "CVE-2020-12762", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-15861", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2020-15861" }, { "cve": "CVE-2020-15862", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2020-15862" }, { "cve": "CVE-2021-3521", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-3521" }, { "cve": "CVE-2021-37750", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-37750" }, { "cve": "CVE-2021-46933", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-46933" }, { "cve": "CVE-2021-46955", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-46955" }, { "cve": "CVE-2021-47074", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47074" }, { "cve": "CVE-2021-47113", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47113" }, { "cve": "CVE-2021-47131", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47131" }, { "cve": "CVE-2021-47162", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47162" }, { "cve": "CVE-2021-47171", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47171" }, { "cve": "CVE-2021-47188", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47188" }, { "cve": "CVE-2021-47206", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47206" }, { "cve": "CVE-2021-47220", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47220" }, { "cve": "CVE-2021-47229", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47229" }, { "cve": "CVE-2021-47231", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47231" }, { "cve": "CVE-2021-47235", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47235" }, { "cve": "CVE-2022-2601", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2022-2601" }, { "cve": "CVE-2022-3775", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2022-3775" }, { "cve": "CVE-2022-44792", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2022-44792" }, { "cve": "CVE-2022-44793", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2022-44793" }, { "cve": "CVE-2022-48566", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2022-48566" }, { "cve": "CVE-2023-27043", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-27043" }, { "cve": "CVE-2023-28074", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-28074" }, { "cve": "CVE-2023-3164", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-3164" }, { "cve": "CVE-2023-36632", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-36632" }, { "cve": "CVE-2023-4421", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-4421" }, { "cve": "CVE-2023-44487", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45288", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-45288" }, { "cve": "CVE-2023-45733", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-45733" }, { "cve": "CVE-2023-45745", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-45745" }, { "cve": "CVE-2023-45918", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-45918" }, { "cve": "CVE-2023-46103", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-46103" }, { "cve": "CVE-2023-4692", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-4692" }, { "cve": "CVE-2023-47233", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-47233" }, { "cve": "CVE-2023-47855", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-47855" }, { "cve": "CVE-2023-49083", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-49083" }, { "cve": "CVE-2023-50782", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-50782" }, { "cve": "CVE-2023-52425", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52425" }, { "cve": "CVE-2023-52426", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52426" }, { "cve": "CVE-2023-52428", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52428" }, { "cve": "CVE-2023-52527", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52527" }, { "cve": "CVE-2023-52586", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52586" }, { "cve": "CVE-2023-52591", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52591" }, { "cve": "CVE-2023-52646", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52646" }, { "cve": "CVE-2023-52653", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52653" }, { "cve": "CVE-2023-52655", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52655" }, { "cve": "CVE-2023-52664", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52664" }, { "cve": "CVE-2023-52685", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52685" }, { "cve": "CVE-2023-52686", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52686" }, { "cve": "CVE-2023-52691", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52691" }, { "cve": "CVE-2023-52696", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52696" }, { "cve": "CVE-2023-52698", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52698" }, { "cve": "CVE-2023-52703", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52703" }, { "cve": "CVE-2023-52730", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52730" }, { "cve": "CVE-2023-52732", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52732" }, { "cve": "CVE-2023-52741", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52741" }, { "cve": "CVE-2023-52742", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52742" }, { "cve": "CVE-2023-52747", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52747" }, { "cve": "CVE-2023-52759", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52759" }, { "cve": "CVE-2023-52774", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52774" }, { "cve": "CVE-2023-52781", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52781" }, { "cve": "CVE-2023-52796", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52796" }, { "cve": "CVE-2023-52803", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52803" }, { "cve": "CVE-2023-52821", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52821" }, { "cve": "CVE-2023-52864", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52864" }, { "cve": "CVE-2023-52865", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52865" }, { "cve": "CVE-2023-52867", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52867" }, { "cve": "CVE-2023-52875", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52875" }, { "cve": "CVE-2023-52880", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52880" }, { "cve": "CVE-2023-5388", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-5388" }, { "cve": "CVE-2023-5752", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-5752" }, { "cve": "CVE-2023-5992", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-5992" }, { "cve": "CVE-2023-6597", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-6597" }, { "cve": "CVE-2024-0397", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-0397" }, { "cve": "CVE-2024-0450", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-0450" }, { "cve": "CVE-2024-0639", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-0639" }, { "cve": "CVE-2024-0727", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-0727" }, { "cve": "CVE-2024-1737", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-1737" }, { "cve": "CVE-2024-1975", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-1975" }, { "cve": "CVE-2024-2004", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-2004" }, { "cve": "CVE-2024-20696", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-20696" }, { "cve": "CVE-2024-22195", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-22195" }, { "cve": "CVE-2024-2398", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-2398" }, { "cve": "CVE-2024-24577", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-24577" }, { "cve": "CVE-2024-24790", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-24790" }, { "cve": "CVE-2024-2511", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-2511" }, { "cve": "CVE-2024-25710", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-25710" }, { "cve": "CVE-2024-26130", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26130" }, { "cve": "CVE-2024-26458", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26458" }, { "cve": "CVE-2024-26461", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26461" }, { "cve": "CVE-2024-26625", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26625" }, { "cve": "CVE-2024-26739", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26739" }, { "cve": "CVE-2024-26752", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26752" }, { "cve": "CVE-2024-26775", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26775" }, { "cve": "CVE-2024-26791", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26791" }, { "cve": "CVE-2024-26828", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26828" }, { "cve": "CVE-2024-26846", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26846" }, { "cve": "CVE-2024-26874", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26874" }, { "cve": "CVE-2024-26876", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26876" }, { "cve": "CVE-2024-26900", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26900" }, { "cve": "CVE-2024-26915", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26915" }, { "cve": "CVE-2024-26920", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26920" }, { "cve": "CVE-2024-26921", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26921" }, { "cve": "CVE-2024-26929", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26929" }, { "cve": "CVE-2024-26930", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26930" }, { "cve": "CVE-2024-26931", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26931" }, { "cve": "CVE-2024-26934", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26934" }, { "cve": "CVE-2024-26957", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26957" }, { "cve": "CVE-2024-26958", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26958" }, { "cve": "CVE-2024-26984", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26984" }, { "cve": "CVE-2024-26996", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26996" }, { "cve": "CVE-2024-27008", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27008" }, { "cve": "CVE-2024-27054", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27054" }, { "cve": "CVE-2024-27059", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27059" }, { "cve": "CVE-2024-27062", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27062" }, { "cve": "CVE-2024-27388", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27388" }, { "cve": "CVE-2024-27396", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27396" }, { "cve": "CVE-2024-27398", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27398" }, { "cve": "CVE-2024-27401", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27401" }, { "cve": "CVE-2024-27419", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27419" }, { "cve": "CVE-2024-27436", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27436" }, { "cve": "CVE-2024-28085", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-28085" }, { "cve": "CVE-2024-28182", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-28182" }, { "cve": "CVE-2024-2961", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-2961" }, { "cve": "CVE-2024-32487", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-32487" }, { "cve": "CVE-2024-33599", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-33599" }, { "cve": "CVE-2024-33600", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-33600" }, { "cve": "CVE-2024-33601", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-33601" }, { "cve": "CVE-2024-33602", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-33602" }, { "cve": "CVE-2024-33871", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-33871" }, { "cve": "CVE-2024-34062", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-34062" }, { "cve": "CVE-2024-34064", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-34064" }, { "cve": "CVE-2024-34459", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-34459" }, { "cve": "CVE-2024-35195", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35195" }, { "cve": "CVE-2024-35235", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35235" }, { "cve": "CVE-2024-35789", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35789" }, { "cve": "CVE-2024-35791", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35791" }, { "cve": "CVE-2024-35809", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35809" }, { "cve": "CVE-2024-35811", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35811" }, { "cve": "CVE-2024-35830", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35830" }, { "cve": "CVE-2024-35849", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35849" }, { "cve": "CVE-2024-35877", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35877" }, { "cve": "CVE-2024-35878", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35878" }, { "cve": "CVE-2024-35887", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35887" }, { "cve": "CVE-2024-35895", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35895" }, { "cve": "CVE-2024-35914", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35914" }, { "cve": "CVE-2024-35932", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35932" }, { "cve": "CVE-2024-35935", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35935" }, { "cve": "CVE-2024-35936", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35936" }, { "cve": "CVE-2024-35944", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35944" }, { "cve": "CVE-2024-35955", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35955" }, { "cve": "CVE-2024-35969", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35969" }, { "cve": "CVE-2024-35982", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35982" }, { "cve": "CVE-2024-36015", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-36015" }, { "cve": "CVE-2024-36029", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-36029" }, { "cve": "CVE-2024-3651", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-3651" }, { "cve": "CVE-2024-36954", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-36954" }, { "cve": "CVE-2024-37370", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37891", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38428", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-38428" }, { "cve": "CVE-2024-39689", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-39689" }, { "cve": "CVE-2024-4032", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-4032" }, { "cve": "CVE-2024-41110", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-41110" }, { "cve": "CVE-2024-4317", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-4317" }, { "cve": "CVE-2024-4741", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-4741" }, { "cve": "CVE-2024-5206", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-5206" }, { "cve": "CVE-2024-5535", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-5535" }, { "cve": "CVE-2024-6232", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-6232" }, { "cve": "CVE-2024-6345", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-6345" }, { "cve": "CVE-2024-6655", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-6655" }, { "cve": "CVE-2024-7264", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-7264" }, { "cve": "CVE-2024-7592", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-7592" }, { "cve": "CVE-2024-53295", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-53295" }, { "cve": "CVE-2024-51534", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-51534" }, { "cve": "CVE-2024-53296", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-53296" } ] }
WID-SEC-W-2023-2031
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2031 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2031.json" }, { "category": "self", "summary": "WID-SEC-2023-2031 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2031" }, { "category": "external", "summary": "Xerox Security Bulletin vom 2023-08-09", "url": "https://security.business.xerox.com/wp-content/uploads/2023/08/cert_XRX23-011_FFPSv7-S11_MediaInstall_Aug2023.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin vom 2023-08-09", "url": "https://security.business.xerox.com/wp-content/uploads/2023/08/cert_XRX23-012_FFPSv2_Win10_SecurityBulletin_Aug2023.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-013 vom 2023-08-24", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2023/08/Xerox-Security-Bulletin-XRX23-013-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2023-2331 vom 2023-11-02", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2331.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202408-17 vom 2024-08-09", "url": "https://security.gentoo.org/glsa/202408-17" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-08-08T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:56:55.155+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-2031", "initial_release_date": "2023-08-09T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-09T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-08-24T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2023-11-02T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-08-08T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Gentoo aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "v2", "product": { "name": "Xerox FreeFlow Print Server v2", "product_id": "T014888", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v2" } } }, { "category": "product_version", "name": "v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } }, { "category": "product_version", "name": "v7 for Solaris", "product": { "name": "Xerox FreeFlow Print Server v7 for Solaris", "product_id": "T029230", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v7_for_solaris" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0687", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2004-0687" }, { "cve": "CVE-2020-23903", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2020-23903" }, { "cve": "CVE-2020-23904", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2020-23904" }, { "cve": "CVE-2021-33621", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2021-33621" }, { "cve": "CVE-2021-33657", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2021-33657" }, { "cve": "CVE-2021-3575", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2021-3575" }, { "cve": "CVE-2021-3618", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2021-3618" }, { "cve": "CVE-2021-43618", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2021-43618" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21123", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-21123" }, { "cve": "CVE-2022-21125", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-21125" }, { "cve": "CVE-2022-21127", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-21127" }, { "cve": "CVE-2022-21166", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-21166" }, { "cve": "CVE-2022-21589", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-21589" }, { "cve": "CVE-2022-21592", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-21592" }, { "cve": "CVE-2022-21608", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-21608" }, { "cve": "CVE-2022-21617", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-21617" }, { "cve": "CVE-2022-28805", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-28805" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-31783", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-31783" }, { "cve": "CVE-2022-33099", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-33099" }, { "cve": "CVE-2022-3729", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-3729" }, { "cve": "CVE-2022-37290", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-37290" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-39348", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-39348" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41722", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-41722" }, { "cve": "CVE-2022-41723", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-41723" }, { "cve": "CVE-2022-41724", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-41724" }, { "cve": "CVE-2022-41725", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-41725" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-44617", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-44617" }, { "cve": "CVE-2022-44792", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-44792" }, { "cve": "CVE-2022-44793", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-44793" }, { "cve": "CVE-2022-46285", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-46285" }, { "cve": "CVE-2022-46663", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-46663" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-4743", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-4743" }, { "cve": "CVE-2022-48303", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-48303" }, { "cve": "CVE-2022-4883", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-4883" }, { "cve": "CVE-2022-4904", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-4904" }, { "cve": "CVE-2023-0002", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-0002" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0494", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-0494" }, { "cve": "CVE-2023-0547", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-0547" }, { "cve": "CVE-2023-1161", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-1161" }, { "cve": "CVE-2023-1945", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-1945" }, { "cve": "CVE-2023-1992", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-1992" }, { "cve": "CVE-2023-1993", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-1993" }, { "cve": "CVE-2023-1994", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-1994" }, { "cve": "CVE-2023-1999", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-1999" }, { "cve": "CVE-2023-21526", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21526" }, { "cve": "CVE-2023-21756", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21756" }, { "cve": "CVE-2023-21911", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21911" }, { "cve": "CVE-2023-21912", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21912" }, { "cve": "CVE-2023-21919", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21919" }, { "cve": "CVE-2023-21920", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21920" }, { "cve": "CVE-2023-21929", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21929" }, { "cve": "CVE-2023-21933", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21933" }, { "cve": "CVE-2023-21935", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21935" }, { "cve": "CVE-2023-21940", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21940" }, { "cve": "CVE-2023-21945", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21945" }, { "cve": "CVE-2023-21946", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21946" }, { "cve": "CVE-2023-21947", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21947" }, { "cve": "CVE-2023-21953", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21953" }, { "cve": "CVE-2023-21955", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21955" }, { "cve": "CVE-2023-21962", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21962" }, { "cve": "CVE-2023-21966", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21966" }, { "cve": "CVE-2023-21972", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21972" }, { "cve": "CVE-2023-21976", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21976" }, { "cve": "CVE-2023-21977", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21977" }, { "cve": "CVE-2023-21980", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21980" }, { "cve": "CVE-2023-21982", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21982" }, { "cve": "CVE-2023-21995", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21995" }, { "cve": "CVE-2023-22006", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-22006" }, { "cve": "CVE-2023-22023", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-22023" }, { "cve": "CVE-2023-22036", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-22036" }, { "cve": "CVE-2023-22041", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-22041" }, { "cve": "CVE-2023-22044", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-22044" }, { "cve": "CVE-2023-22045", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-22045" }, { "cve": "CVE-2023-22049", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-22049" }, { "cve": "CVE-2023-23931", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-23931" }, { "cve": "CVE-2023-24021", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24021" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-24536", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24536" }, { "cve": "CVE-2023-24537", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24537" }, { "cve": "CVE-2023-24538", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24538" }, { "cve": "CVE-2023-24539", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24539" }, { "cve": "CVE-2023-24540", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24540" }, { "cve": "CVE-2023-24932", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24932" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26767", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-26767" }, { "cve": "CVE-2023-26768", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-26768" }, { "cve": "CVE-2023-26769", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-26769" }, { "cve": "CVE-2023-2731", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-2731" }, { "cve": "CVE-2023-27320", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-27320" }, { "cve": "CVE-2023-27522", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-27522" }, { "cve": "CVE-2023-28005", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-28005" }, { "cve": "CVE-2023-28484", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-28484" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28709", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-28709" }, { "cve": "CVE-2023-28755", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-28755" }, { "cve": "CVE-2023-28756", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-28756" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29400", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29400" }, { "cve": "CVE-2023-29469", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29469" }, { "cve": "CVE-2023-29479", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29479" }, { "cve": "CVE-2023-29531", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29531" }, { "cve": "CVE-2023-29532", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29532" }, { "cve": "CVE-2023-29533", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29533" }, { "cve": "CVE-2023-29535", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29535" }, { "cve": "CVE-2023-29536", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29536" }, { "cve": "CVE-2023-29539", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29539" }, { "cve": "CVE-2023-29541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29541" }, { "cve": "CVE-2023-29542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29542" }, { "cve": "CVE-2023-29545", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29545" }, { "cve": "CVE-2023-29548", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29548" }, { "cve": "CVE-2023-29550", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29550" }, { "cve": "CVE-2023-30086", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-30086" }, { "cve": "CVE-2023-30608", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-30608" }, { "cve": "CVE-2023-30774", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-30774" }, { "cve": "CVE-2023-30775", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-30775" }, { "cve": "CVE-2023-31047", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-31047" }, { "cve": "CVE-2023-31284", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-31284" }, { "cve": "CVE-2023-32034", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32034" }, { "cve": "CVE-2023-32035", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32035" }, { "cve": "CVE-2023-32038", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32038" }, { "cve": "CVE-2023-32039", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32039" }, { "cve": "CVE-2023-32040", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32040" }, { "cve": "CVE-2023-32041", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32041" }, { "cve": "CVE-2023-32042", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32042" }, { "cve": "CVE-2023-32043", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32043" }, { "cve": "CVE-2023-32044", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32044" }, { "cve": "CVE-2023-32045", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32045" }, { "cve": "CVE-2023-32046", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32046" }, { "cve": "CVE-2023-32049", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32049" }, { "cve": "CVE-2023-32053", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32053" }, { "cve": "CVE-2023-32054", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32054" }, { "cve": "CVE-2023-32055", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32055" }, { "cve": "CVE-2023-32057", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32057" }, { "cve": "CVE-2023-32085", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32085" }, { "cve": "CVE-2023-32205", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32205" }, { "cve": "CVE-2023-32206", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32206" }, { "cve": "CVE-2023-32207", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32207" }, { "cve": "CVE-2023-32208", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32208" }, { "cve": "CVE-2023-32209", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32209" }, { "cve": "CVE-2023-32210", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32210" }, { "cve": "CVE-2023-32211", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32211" }, { "cve": "CVE-2023-32212", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32212" }, { "cve": "CVE-2023-32213", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32213" }, { "cve": "CVE-2023-32214", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32214" }, { "cve": "CVE-2023-32215", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32215" }, { "cve": "CVE-2023-32216", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32216" }, { "cve": "CVE-2023-32324", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32324" }, { "cve": "CVE-2023-33134", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33134" }, { "cve": "CVE-2023-33154", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33154" }, { "cve": "CVE-2023-33157", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33157" }, { "cve": "CVE-2023-33160", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33160" }, { "cve": "CVE-2023-33164", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33164" }, { "cve": "CVE-2023-33166", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33166" }, { "cve": "CVE-2023-33167", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33167" }, { "cve": "CVE-2023-33168", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33168" }, { "cve": "CVE-2023-33169", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33169" }, { "cve": "CVE-2023-33172", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33172" }, { "cve": "CVE-2023-33173", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33173" }, { "cve": "CVE-2023-33174", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33174" }, { "cve": "CVE-2023-34414", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-34414" }, { "cve": "CVE-2023-34415", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-34415" }, { "cve": "CVE-2023-34416", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-34416" }, { "cve": "CVE-2023-34417", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-34417" }, { "cve": "CVE-2023-3482", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-3482" }, { "cve": "CVE-2023-34981", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-34981" }, { "cve": "CVE-2023-35296", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35296" }, { "cve": "CVE-2023-35297", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35297" }, { "cve": "CVE-2023-35299", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35299" }, { "cve": "CVE-2023-35300", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35300" }, { "cve": "CVE-2023-35302", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35302" }, { "cve": "CVE-2023-35303", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35303" }, { "cve": "CVE-2023-35304", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35304" }, { "cve": "CVE-2023-35305", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35305" }, { "cve": "CVE-2023-35306", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35306" }, { "cve": "CVE-2023-35308", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35308" }, { "cve": "CVE-2023-35309", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35309" }, { "cve": "CVE-2023-35311", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35311" }, { "cve": "CVE-2023-35312", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35312" }, { "cve": "CVE-2023-35313", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35313" }, { "cve": "CVE-2023-35314", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35314" }, { "cve": "CVE-2023-35315", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35315" }, { "cve": "CVE-2023-35316", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35316" }, { "cve": "CVE-2023-35318", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35318" }, { "cve": "CVE-2023-35319", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35319" }, { "cve": "CVE-2023-35320", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35320" }, { "cve": "CVE-2023-35324", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35324" }, { "cve": "CVE-2023-35325", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35325" }, { "cve": "CVE-2023-35328", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35328" }, { "cve": "CVE-2023-35329", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35329" }, { "cve": "CVE-2023-35330", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35330" }, { "cve": "CVE-2023-35332", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35332" }, { "cve": "CVE-2023-35336", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35336" }, { "cve": "CVE-2023-35338", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35338" }, { "cve": "CVE-2023-35339", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35339" }, { "cve": "CVE-2023-35340", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35340" }, { "cve": "CVE-2023-35341", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35341" }, { "cve": "CVE-2023-35342", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35342" }, { "cve": "CVE-2023-35352", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35352" }, { "cve": "CVE-2023-35353", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35353" }, { "cve": "CVE-2023-35356", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35356" }, { "cve": "CVE-2023-35357", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35357" }, { "cve": "CVE-2023-35358", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35358" }, { "cve": "CVE-2023-35360", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35360" }, { "cve": "CVE-2023-35361", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35361" }, { "cve": "CVE-2023-35362", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35362" }, { "cve": "CVE-2023-35365", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35365" }, { "cve": "CVE-2023-35366", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35366" }, { "cve": "CVE-2023-35367", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35367" }, { "cve": "CVE-2023-3600", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-3600" }, { "cve": "CVE-2023-36871", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-36871" }, { "cve": "CVE-2023-36874", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-36874" }, { "cve": "CVE-2023-36884", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-36884" }, { "cve": "CVE-2023-37201", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37201" }, { "cve": "CVE-2023-37202", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37202" }, { "cve": "CVE-2023-37203", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37203" }, { "cve": "CVE-2023-37204", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37204" }, { "cve": "CVE-2023-37205", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37205" }, { "cve": "CVE-2023-37206", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37206" }, { "cve": "CVE-2023-37207", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37207" }, { "cve": "CVE-2023-37208", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37208" }, { "cve": "CVE-2023-37209", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37209" }, { "cve": "CVE-2023-37210", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37210" }, { "cve": "CVE-2023-37211", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37211" }, { "cve": "CVE-2023-37212", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37212" } ] }
wid-sec-w-2022-1996
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Net-SNMP ist eine Software-Suite zur Verwendung und Anwendung des SNMP (simple network management protocol) Protokolls. Sie unterst\u00fctzt IPv4, IPv6, IPX, AAL5, Unix domain sockets und andere Transportprotokolle. In der Suite sind eine Client-Bibliothek, eine Sammlung von Kommandozeilen-Tools, ein SNMP Agent sowie Perl- und Python-Module enthalten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Net-SNMP ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1996 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1996.json" }, { "category": "self", "summary": "WID-SEC-2022-1996 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1996" }, { "category": "external", "summary": "National Vulnerability Database - CVE-2022-44793 Detail vom 2022-11-08", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44793" }, { "category": "external", "summary": "PoC", "url": "https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5795-1 vom 2023-01-09", "url": "https://ubuntu.com/security/notices/USN-5795-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0068-1 vom 2023-01-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013454.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0075-1 vom 2023-01-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013464.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3270 vom 2023-01-15", "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5795-2 vom 2023-01-16", "url": "https://ubuntu.com/security/notices/USN-5795-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:2444 vom 2023-05-09", "url": "https://access.redhat.com/errata/RHSA-2023:2444" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:2969 vom 2023-05-16", "url": "https://access.redhat.com/errata/RHSA-2023:2969" }, { "category": "external", "summary": "Meinberg Security Advisory MBGSA-2023.03 vom 2023-05-23", "url": "https://www.meinbergglobal.com/english/news/meinberg-security-advisory-mbgsa-2023-03-lantime-firmware-v7-06-014.htm" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-2969 vom 2023-05-24", "url": "https://linux.oracle.com/errata/ELSA-2023-2969.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2402 vom 2024-01-10", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2402.html" } ], "source_lang": "en-US", "title": "Net-SNMP: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2024-01-09T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:37:48.537+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-1996", "initial_release_date": "2022-11-08T23:00:00.000+00:00", "revision_history": [ { "date": "2022-11-08T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-01-09T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-01-12T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-01-15T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-01-16T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-05-09T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-16T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-22T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Meinberg aufgenommen" }, { "date": "2023-05-23T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-01-09T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "11" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Meinberg LANTIME \u003c V7.06.014", "product": { "name": "Meinberg LANTIME \u003c V7.06.014", "product_id": "T027837", "product_identification_helper": { "cpe": "cpe:/h:meinberg:lantime:v7.06.014" } } } ], "category": "vendor", "name": "Meinberg" }, { "branches": [ { "category": "product_name", "name": "Open Source Net-SNMP \u003c= 5.9.3", "product": { "name": "Open Source Net-SNMP \u003c= 5.9.3", "product_id": "T025243", "product_identification_helper": { "cpe": "cpe:/a:net-snmp:net-snmp:5.8_-_5.9.3" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-44793", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Net-SNMP. Der Fehler besteht aufgrund eines NULL Pointer Exception Fehlers. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er ein manipuliertes UDP-Paket verwendet, um einen Denial-of-Service-Zustand auszul\u00f6sen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T027837", "T000126", "398363", "T004914" ], "last_affected": [ "T025243" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-44793" } ] }
wid-sec-w-2023-2031
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2031 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2031.json" }, { "category": "self", "summary": "WID-SEC-2023-2031 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2031" }, { "category": "external", "summary": "Xerox Security Bulletin vom 2023-08-09", "url": "https://security.business.xerox.com/wp-content/uploads/2023/08/cert_XRX23-011_FFPSv7-S11_MediaInstall_Aug2023.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin vom 2023-08-09", "url": "https://security.business.xerox.com/wp-content/uploads/2023/08/cert_XRX23-012_FFPSv2_Win10_SecurityBulletin_Aug2023.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-013 vom 2023-08-24", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2023/08/Xerox-Security-Bulletin-XRX23-013-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2023-2331 vom 2023-11-02", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2331.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202408-17 vom 2024-08-09", "url": "https://security.gentoo.org/glsa/202408-17" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-08-08T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:56:55.155+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-2031", "initial_release_date": "2023-08-09T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-09T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-08-24T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2023-11-02T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-08-08T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Gentoo aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "v2", "product": { "name": "Xerox FreeFlow Print Server v2", "product_id": "T014888", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v2" } } }, { "category": "product_version", "name": "v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } }, { "category": "product_version", "name": "v7 for Solaris", "product": { "name": "Xerox FreeFlow Print Server v7 for Solaris", "product_id": "T029230", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v7_for_solaris" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0687", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2004-0687" }, { "cve": "CVE-2020-23903", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2020-23903" }, { "cve": "CVE-2020-23904", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2020-23904" }, { "cve": "CVE-2021-33621", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2021-33621" }, { "cve": "CVE-2021-33657", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2021-33657" }, { "cve": "CVE-2021-3575", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2021-3575" }, { "cve": "CVE-2021-3618", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2021-3618" }, { "cve": "CVE-2021-43618", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2021-43618" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21123", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-21123" }, { "cve": "CVE-2022-21125", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-21125" }, { "cve": "CVE-2022-21127", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-21127" }, { "cve": "CVE-2022-21166", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-21166" }, { "cve": "CVE-2022-21589", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-21589" }, { "cve": "CVE-2022-21592", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-21592" }, { "cve": "CVE-2022-21608", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-21608" }, { "cve": "CVE-2022-21617", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-21617" }, { "cve": "CVE-2022-28805", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-28805" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-31783", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-31783" }, { "cve": "CVE-2022-33099", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-33099" }, { "cve": "CVE-2022-3729", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-3729" }, { "cve": "CVE-2022-37290", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-37290" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-39348", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-39348" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41722", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-41722" }, { "cve": "CVE-2022-41723", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-41723" }, { "cve": "CVE-2022-41724", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-41724" }, { "cve": "CVE-2022-41725", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-41725" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-44617", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-44617" }, { "cve": "CVE-2022-44792", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-44792" }, { "cve": "CVE-2022-44793", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-44793" }, { "cve": "CVE-2022-46285", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-46285" }, { "cve": "CVE-2022-46663", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-46663" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-4743", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-4743" }, { "cve": "CVE-2022-48303", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-48303" }, { "cve": "CVE-2022-4883", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-4883" }, { "cve": "CVE-2022-4904", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2022-4904" }, { "cve": "CVE-2023-0002", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-0002" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0494", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-0494" }, { "cve": "CVE-2023-0547", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-0547" }, { "cve": "CVE-2023-1161", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-1161" }, { "cve": "CVE-2023-1945", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-1945" }, { "cve": "CVE-2023-1992", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-1992" }, { "cve": "CVE-2023-1993", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-1993" }, { "cve": "CVE-2023-1994", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-1994" }, { "cve": "CVE-2023-1999", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-1999" }, { "cve": "CVE-2023-21526", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21526" }, { "cve": "CVE-2023-21756", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21756" }, { "cve": "CVE-2023-21911", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21911" }, { "cve": "CVE-2023-21912", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21912" }, { "cve": "CVE-2023-21919", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21919" }, { "cve": "CVE-2023-21920", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21920" }, { "cve": "CVE-2023-21929", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21929" }, { "cve": "CVE-2023-21933", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21933" }, { "cve": "CVE-2023-21935", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21935" }, { "cve": "CVE-2023-21940", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21940" }, { "cve": "CVE-2023-21945", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21945" }, { "cve": "CVE-2023-21946", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21946" }, { "cve": "CVE-2023-21947", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21947" }, { "cve": "CVE-2023-21953", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21953" }, { "cve": "CVE-2023-21955", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21955" }, { "cve": "CVE-2023-21962", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21962" }, { "cve": "CVE-2023-21966", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21966" }, { "cve": "CVE-2023-21972", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21972" }, { "cve": "CVE-2023-21976", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21976" }, { "cve": "CVE-2023-21977", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21977" }, { "cve": "CVE-2023-21980", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21980" }, { "cve": "CVE-2023-21982", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21982" }, { "cve": "CVE-2023-21995", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-21995" }, { "cve": "CVE-2023-22006", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-22006" }, { "cve": "CVE-2023-22023", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-22023" }, { "cve": "CVE-2023-22036", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-22036" }, { "cve": "CVE-2023-22041", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-22041" }, { "cve": "CVE-2023-22044", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-22044" }, { "cve": "CVE-2023-22045", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-22045" }, { "cve": "CVE-2023-22049", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-22049" }, { "cve": "CVE-2023-23931", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-23931" }, { "cve": "CVE-2023-24021", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24021" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-24536", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24536" }, { "cve": "CVE-2023-24537", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24537" }, { "cve": "CVE-2023-24538", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24538" }, { "cve": "CVE-2023-24539", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24539" }, { "cve": "CVE-2023-24540", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24540" }, { "cve": "CVE-2023-24932", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24932" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26767", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-26767" }, { "cve": "CVE-2023-26768", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-26768" }, { "cve": "CVE-2023-26769", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-26769" }, { "cve": "CVE-2023-2731", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-2731" }, { "cve": "CVE-2023-27320", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-27320" }, { "cve": "CVE-2023-27522", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-27522" }, { "cve": "CVE-2023-28005", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-28005" }, { "cve": "CVE-2023-28484", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-28484" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28709", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-28709" }, { "cve": "CVE-2023-28755", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-28755" }, { "cve": "CVE-2023-28756", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-28756" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29400", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29400" }, { "cve": "CVE-2023-29469", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29469" }, { "cve": "CVE-2023-29479", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29479" }, { "cve": "CVE-2023-29531", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29531" }, { "cve": "CVE-2023-29532", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29532" }, { "cve": "CVE-2023-29533", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29533" }, { "cve": "CVE-2023-29535", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29535" }, { "cve": "CVE-2023-29536", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29536" }, { "cve": "CVE-2023-29539", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29539" }, { "cve": "CVE-2023-29541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29541" }, { "cve": "CVE-2023-29542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29542" }, { "cve": "CVE-2023-29545", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29545" }, { "cve": "CVE-2023-29548", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29548" }, { "cve": "CVE-2023-29550", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-29550" }, { "cve": "CVE-2023-30086", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-30086" }, { "cve": "CVE-2023-30608", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-30608" }, { "cve": "CVE-2023-30774", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-30774" }, { "cve": "CVE-2023-30775", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-30775" }, { "cve": "CVE-2023-31047", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-31047" }, { "cve": "CVE-2023-31284", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-31284" }, { "cve": "CVE-2023-32034", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32034" }, { "cve": "CVE-2023-32035", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32035" }, { "cve": "CVE-2023-32038", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32038" }, { "cve": "CVE-2023-32039", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32039" }, { "cve": "CVE-2023-32040", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32040" }, { "cve": "CVE-2023-32041", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32041" }, { "cve": "CVE-2023-32042", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32042" }, { "cve": "CVE-2023-32043", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32043" }, { "cve": "CVE-2023-32044", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32044" }, { "cve": "CVE-2023-32045", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32045" }, { "cve": "CVE-2023-32046", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32046" }, { "cve": "CVE-2023-32049", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32049" }, { "cve": "CVE-2023-32053", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32053" }, { "cve": "CVE-2023-32054", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32054" }, { "cve": "CVE-2023-32055", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32055" }, { "cve": "CVE-2023-32057", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32057" }, { "cve": "CVE-2023-32085", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32085" }, { "cve": "CVE-2023-32205", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32205" }, { "cve": "CVE-2023-32206", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32206" }, { "cve": "CVE-2023-32207", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32207" }, { "cve": "CVE-2023-32208", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32208" }, { "cve": "CVE-2023-32209", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32209" }, { "cve": "CVE-2023-32210", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32210" }, { "cve": "CVE-2023-32211", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32211" }, { "cve": "CVE-2023-32212", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32212" }, { "cve": "CVE-2023-32213", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32213" }, { "cve": "CVE-2023-32214", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32214" }, { "cve": "CVE-2023-32215", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32215" }, { "cve": "CVE-2023-32216", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32216" }, { "cve": "CVE-2023-32324", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-32324" }, { "cve": "CVE-2023-33134", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33134" }, { "cve": "CVE-2023-33154", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33154" }, { "cve": "CVE-2023-33157", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33157" }, { "cve": "CVE-2023-33160", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33160" }, { "cve": "CVE-2023-33164", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33164" }, { "cve": "CVE-2023-33166", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33166" }, { "cve": "CVE-2023-33167", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33167" }, { "cve": "CVE-2023-33168", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33168" }, { "cve": "CVE-2023-33169", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33169" }, { "cve": "CVE-2023-33172", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33172" }, { "cve": "CVE-2023-33173", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33173" }, { "cve": "CVE-2023-33174", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-33174" }, { "cve": "CVE-2023-34414", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-34414" }, { "cve": "CVE-2023-34415", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-34415" }, { "cve": "CVE-2023-34416", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-34416" }, { "cve": "CVE-2023-34417", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-34417" }, { "cve": "CVE-2023-3482", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-3482" }, { "cve": "CVE-2023-34981", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-34981" }, { "cve": "CVE-2023-35296", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35296" }, { "cve": "CVE-2023-35297", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35297" }, { "cve": "CVE-2023-35299", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35299" }, { "cve": "CVE-2023-35300", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35300" }, { "cve": "CVE-2023-35302", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35302" }, { "cve": "CVE-2023-35303", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35303" }, { "cve": "CVE-2023-35304", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35304" }, { "cve": "CVE-2023-35305", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35305" }, { "cve": "CVE-2023-35306", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35306" }, { "cve": "CVE-2023-35308", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35308" }, { "cve": "CVE-2023-35309", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35309" }, { "cve": "CVE-2023-35311", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35311" }, { "cve": "CVE-2023-35312", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35312" }, { "cve": "CVE-2023-35313", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35313" }, { "cve": "CVE-2023-35314", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35314" }, { "cve": "CVE-2023-35315", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35315" }, { "cve": "CVE-2023-35316", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35316" }, { "cve": "CVE-2023-35318", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35318" }, { "cve": "CVE-2023-35319", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35319" }, { "cve": "CVE-2023-35320", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35320" }, { "cve": "CVE-2023-35324", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35324" }, { "cve": "CVE-2023-35325", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35325" }, { "cve": "CVE-2023-35328", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35328" }, { "cve": "CVE-2023-35329", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35329" }, { "cve": "CVE-2023-35330", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35330" }, { "cve": "CVE-2023-35332", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35332" }, { "cve": "CVE-2023-35336", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35336" }, { "cve": "CVE-2023-35338", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35338" }, { "cve": "CVE-2023-35339", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35339" }, { "cve": "CVE-2023-35340", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35340" }, { "cve": "CVE-2023-35341", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35341" }, { "cve": "CVE-2023-35342", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35342" }, { "cve": "CVE-2023-35352", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35352" }, { "cve": "CVE-2023-35353", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35353" }, { "cve": "CVE-2023-35356", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35356" }, { "cve": "CVE-2023-35357", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35357" }, { "cve": "CVE-2023-35358", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35358" }, { "cve": "CVE-2023-35360", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35360" }, { "cve": "CVE-2023-35361", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35361" }, { "cve": "CVE-2023-35362", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35362" }, { "cve": "CVE-2023-35365", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35365" }, { "cve": "CVE-2023-35366", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35366" }, { "cve": "CVE-2023-35367", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-35367" }, { "cve": "CVE-2023-3600", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-3600" }, { "cve": "CVE-2023-36871", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-36871" }, { "cve": "CVE-2023-36874", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-36874" }, { "cve": "CVE-2023-36884", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-36884" }, { "cve": "CVE-2023-37201", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37201" }, { "cve": "CVE-2023-37202", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37202" }, { "cve": "CVE-2023-37203", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37203" }, { "cve": "CVE-2023-37204", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37204" }, { "cve": "CVE-2023-37205", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37205" }, { "cve": "CVE-2023-37206", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37206" }, { "cve": "CVE-2023-37207", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37207" }, { "cve": "CVE-2023-37208", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37208" }, { "cve": "CVE-2023-37209", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37209" }, { "cve": "CVE-2023-37210", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37210" }, { "cve": "CVE-2023-37211", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37211" }, { "cve": "CVE-2023-37212", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Servern mehrerer Versionen existieren mehrere Schwachstellen im Zusammenhang mit bekannten Windows, Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T029230", "T014888", "398363", "T015632", "T012167" ] }, "release_date": "2023-08-09T22:00:00.000+00:00", "title": "CVE-2023-37212" } ] }
ssa-625862
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 are affected by multiple vulnerabilities in third-party components and the integrated web server.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-625862.html" }, { "category": "self", "summary": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-625862.json" }, { "category": "self", "summary": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-625862.pdf" }, { "category": "self", "summary": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-625862.txt" } ], "title": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3", "tracking": { "current_release_date": "2024-06-11T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-625862", "initial_release_date": "2024-06-11T00:00:00Z", "revision_history": [ { "date": "2024-06-11T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "interim", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)", "product_id": "1", "product_identification_helper": { "model_numbers": [ "6GK7542-6UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0)", "product_id": "2", "product_identification_helper": { "model_numbers": [ "6GK7542-6VX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)", "product_id": "3", "product_identification_helper": { "model_numbers": [ "6GK7543-6WX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0)", "product_id": "4", "product_identification_helper": { "model_numbers": [ "6AG2542-6VX00-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)", "product_id": "5", "product_identification_helper": { "model_numbers": [ "6AG1543-6WX00-7XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)", "product_id": "6", "product_identification_helper": { "model_numbers": [ "6AG2543-6WX00-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2097", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn\u0027t written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-2097" }, { "cve": "CVE-2022-3435", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-3435" }, { "cve": "CVE-2022-3545", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3623", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211921 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-3623" }, { "cve": "CVE-2022-3643", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-3643" }, { "cve": "CVE-2022-4304", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-4304" }, { "cve": "CVE-2022-4450", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-4450" }, { "cve": "CVE-2022-40303", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-40304" }, { "cve": "CVE-2022-42328", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "Guests can trigger deadlock in Linux netback driver [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "Guests can trigger deadlock in Linux netback drive. The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-42329" }, { "cve": "CVE-2022-44792", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-44792" }, { "cve": "CVE-2022-44793", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-44793" }, { "cve": "CVE-2023-0215", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0464", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing the `-policy` argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Applications that use a non-default option when verifying certificates may be\r\nvulnerable to an attack from a malicious CA to circumvent certain checks.\r\n\r\nInvalid certificate policies in leaf certificates are silently ignored by\r\nOpenSSL and other certificate policy checks are skipped for that certificate.\r\nA malicious CA could use this to deliberately assert invalid certificate policies\r\nin order to circumvent policy checking on the certificate altogether.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing\r\nthe `-policy` argument to the command line utilities or by calling the\r\n`X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The function X509_VERIFY_PARAM_add0_policy() is documented to\nimplicitly enable the certificate policy check when doing certificate\nverification. However the implementation of the function does not\nenable the check which allows certificates with invalid or incorrect\npolicies to pass the certificate verification.\n\nAs suddenly enabling the policy check could break existing deployments it was\ndecided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()\nfunction.\n\nInstead the applications that require OpenSSL to perform certificate\npolicy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly\nenable the policy check by calling X509_VERIFY_PARAM_set_flags() with\nthe X509_V_FLAG_POLICY_CHECK flag argument.\n\nCertificate policy checks are disabled by default in OpenSSL and are not\ncommonly used by applications.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-0466" }, { "cve": "CVE-2023-28484", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-28484" }, { "cve": "CVE-2023-29469", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the \u0027\\0\u0027 value).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-29469" }, { "cve": "CVE-2023-38380", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "The webserver implementation of the affected products does not correctly release allocated memory after it has been used.\r\n\r\nAn attacker with network access could use this vulnerability to cause a denial-of-service condition in the webserver of the affected product.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-38380" }, { "cve": "CVE-2023-41910", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An issue was discovered in lldpd before 1.0.17. By crafting a CDP PDU packet with specific CDP_TLV_ADDRESSES TLVs, a malicious actor can remotely force the lldpd daemon to perform an out-of-bounds read on heap memory. This occurs in cdp_decode in daemon/protocols/cdp.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-41910" }, { "cve": "CVE-2023-50763", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The web server of affected products, if configured to allow the import of PKCS12 containers, could end up in an infinite loop when processing incomplete certificate chains.\r\n\r\nThis could allow an authenticated remote attacker to create a denial of service condition by importing specially crafted PKCS12 containers.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-50763" } ] }
SSA-625862
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 are affected by multiple vulnerabilities in third-party components and the integrated web server.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-625862.html" }, { "category": "self", "summary": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-625862.json" }, { "category": "self", "summary": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-625862.pdf" }, { "category": "self", "summary": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-625862.txt" } ], "title": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3", "tracking": { "current_release_date": "2024-06-11T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-625862", "initial_release_date": "2024-06-11T00:00:00Z", "revision_history": [ { "date": "2024-06-11T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "interim", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)", "product_id": "1", "product_identification_helper": { "model_numbers": [ "6GK7542-6UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0)", "product_id": "2", "product_identification_helper": { "model_numbers": [ "6GK7542-6VX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)", "product_id": "3", "product_identification_helper": { "model_numbers": [ "6GK7543-6WX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0)", "product_id": "4", "product_identification_helper": { "model_numbers": [ "6AG2542-6VX00-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)", "product_id": "5", "product_identification_helper": { "model_numbers": [ "6AG1543-6WX00-7XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)", "product_id": "6", "product_identification_helper": { "model_numbers": [ "6AG2543-6WX00-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2097", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn\u0027t written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-2097" }, { "cve": "CVE-2022-3435", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-3435" }, { "cve": "CVE-2022-3545", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3623", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211921 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-3623" }, { "cve": "CVE-2022-3643", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-3643" }, { "cve": "CVE-2022-4304", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-4304" }, { "cve": "CVE-2022-4450", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-4450" }, { "cve": "CVE-2022-40303", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-40304" }, { "cve": "CVE-2022-42328", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "Guests can trigger deadlock in Linux netback driver [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "Guests can trigger deadlock in Linux netback drive. The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-42329" }, { "cve": "CVE-2022-44792", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-44792" }, { "cve": "CVE-2022-44793", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2022-44793" }, { "cve": "CVE-2023-0215", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0464", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing the `-policy` argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Applications that use a non-default option when verifying certificates may be\r\nvulnerable to an attack from a malicious CA to circumvent certain checks.\r\n\r\nInvalid certificate policies in leaf certificates are silently ignored by\r\nOpenSSL and other certificate policy checks are skipped for that certificate.\r\nA malicious CA could use this to deliberately assert invalid certificate policies\r\nin order to circumvent policy checking on the certificate altogether.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing\r\nthe `-policy` argument to the command line utilities or by calling the\r\n`X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The function X509_VERIFY_PARAM_add0_policy() is documented to\nimplicitly enable the certificate policy check when doing certificate\nverification. However the implementation of the function does not\nenable the check which allows certificates with invalid or incorrect\npolicies to pass the certificate verification.\n\nAs suddenly enabling the policy check could break existing deployments it was\ndecided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()\nfunction.\n\nInstead the applications that require OpenSSL to perform certificate\npolicy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly\nenable the policy check by calling X509_VERIFY_PARAM_set_flags() with\nthe X509_V_FLAG_POLICY_CHECK flag argument.\n\nCertificate policy checks are disabled by default in OpenSSL and are not\ncommonly used by applications.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-0466" }, { "cve": "CVE-2023-28484", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-28484" }, { "cve": "CVE-2023-29469", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the \u0027\\0\u0027 value).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-29469" }, { "cve": "CVE-2023-38380", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "The webserver implementation of the affected products does not correctly release allocated memory after it has been used.\r\n\r\nAn attacker with network access could use this vulnerability to cause a denial-of-service condition in the webserver of the affected product.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-38380" }, { "cve": "CVE-2023-41910", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An issue was discovered in lldpd before 1.0.17. By crafting a CDP PDU packet with specific CDP_TLV_ADDRESSES TLVs, a malicious actor can remotely force the lldpd daemon to perform an out-of-bounds read on heap memory. This occurs in cdp_decode in daemon/protocols/cdp.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-41910" }, { "cve": "CVE-2023-50763", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The web server of affected products, if configured to allow the import of PKCS12 containers, could end up in an infinite loop when processing incomplete certificate chains.\r\n\r\nThis could allow an authenticated remote attacker to create a denial of service condition by importing specially crafted PKCS12 containers.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "1", "2", "3", "4", "5", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6" ] } ], "title": "CVE-2023-50763" } ] }
opensuse-su-2024:12598-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "libsnmp40-32bit-5.9.3-4.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the libsnmp40-32bit-5.9.3-4.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-12598", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12598-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44793 page", "url": "https://www.suse.com/security/cve/CVE-2022-44793/" } ], "title": "libsnmp40-32bit-5.9.3-4.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:12598-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libsnmp40-5.9.3-4.1.aarch64", "product": { "name": "libsnmp40-5.9.3-4.1.aarch64", "product_id": "libsnmp40-5.9.3-4.1.aarch64" } }, { "category": "product_version", "name": "libsnmp40-32bit-5.9.3-4.1.aarch64", "product": { "name": "libsnmp40-32bit-5.9.3-4.1.aarch64", "product_id": "libsnmp40-32bit-5.9.3-4.1.aarch64" } }, { "category": "product_version", "name": "net-snmp-5.9.3-4.1.aarch64", "product": { "name": "net-snmp-5.9.3-4.1.aarch64", "product_id": "net-snmp-5.9.3-4.1.aarch64" } }, { "category": "product_version", "name": "net-snmp-devel-5.9.3-4.1.aarch64", "product": { "name": "net-snmp-devel-5.9.3-4.1.aarch64", "product_id": "net-snmp-devel-5.9.3-4.1.aarch64" } }, { "category": "product_version", "name": "net-snmp-devel-32bit-5.9.3-4.1.aarch64", "product": { "name": "net-snmp-devel-32bit-5.9.3-4.1.aarch64", "product_id": "net-snmp-devel-32bit-5.9.3-4.1.aarch64" } }, { "category": "product_version", "name": "perl-SNMP-5.9.3-4.1.aarch64", "product": { "name": "perl-SNMP-5.9.3-4.1.aarch64", "product_id": "perl-SNMP-5.9.3-4.1.aarch64" } }, { "category": "product_version", "name": "python310-net-snmp-5.9.3-4.1.aarch64", "product": { "name": "python310-net-snmp-5.9.3-4.1.aarch64", "product_id": "python310-net-snmp-5.9.3-4.1.aarch64" } }, { "category": "product_version", "name": "python38-net-snmp-5.9.3-4.1.aarch64", "product": { "name": "python38-net-snmp-5.9.3-4.1.aarch64", "product_id": "python38-net-snmp-5.9.3-4.1.aarch64" } }, { "category": "product_version", "name": "python39-net-snmp-5.9.3-4.1.aarch64", "product": { "name": "python39-net-snmp-5.9.3-4.1.aarch64", "product_id": "python39-net-snmp-5.9.3-4.1.aarch64" } }, { "category": "product_version", "name": "snmp-mibs-5.9.3-4.1.aarch64", "product": { "name": "snmp-mibs-5.9.3-4.1.aarch64", "product_id": "snmp-mibs-5.9.3-4.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libsnmp40-5.9.3-4.1.ppc64le", "product": { "name": "libsnmp40-5.9.3-4.1.ppc64le", "product_id": "libsnmp40-5.9.3-4.1.ppc64le" } }, { "category": "product_version", "name": "libsnmp40-32bit-5.9.3-4.1.ppc64le", "product": { "name": "libsnmp40-32bit-5.9.3-4.1.ppc64le", "product_id": "libsnmp40-32bit-5.9.3-4.1.ppc64le" } }, { "category": "product_version", "name": "net-snmp-5.9.3-4.1.ppc64le", "product": { "name": "net-snmp-5.9.3-4.1.ppc64le", "product_id": "net-snmp-5.9.3-4.1.ppc64le" } }, { "category": "product_version", "name": "net-snmp-devel-5.9.3-4.1.ppc64le", "product": { "name": "net-snmp-devel-5.9.3-4.1.ppc64le", "product_id": "net-snmp-devel-5.9.3-4.1.ppc64le" } }, { "category": "product_version", "name": "net-snmp-devel-32bit-5.9.3-4.1.ppc64le", "product": { "name": "net-snmp-devel-32bit-5.9.3-4.1.ppc64le", "product_id": "net-snmp-devel-32bit-5.9.3-4.1.ppc64le" } }, { "category": "product_version", "name": "perl-SNMP-5.9.3-4.1.ppc64le", "product": { "name": "perl-SNMP-5.9.3-4.1.ppc64le", "product_id": "perl-SNMP-5.9.3-4.1.ppc64le" } }, { "category": "product_version", "name": "python310-net-snmp-5.9.3-4.1.ppc64le", "product": { "name": "python310-net-snmp-5.9.3-4.1.ppc64le", "product_id": "python310-net-snmp-5.9.3-4.1.ppc64le" } }, { "category": "product_version", "name": "python38-net-snmp-5.9.3-4.1.ppc64le", "product": { "name": "python38-net-snmp-5.9.3-4.1.ppc64le", "product_id": "python38-net-snmp-5.9.3-4.1.ppc64le" } }, { "category": "product_version", "name": "python39-net-snmp-5.9.3-4.1.ppc64le", "product": { "name": "python39-net-snmp-5.9.3-4.1.ppc64le", "product_id": "python39-net-snmp-5.9.3-4.1.ppc64le" } }, { "category": "product_version", "name": "snmp-mibs-5.9.3-4.1.ppc64le", "product": { "name": "snmp-mibs-5.9.3-4.1.ppc64le", "product_id": "snmp-mibs-5.9.3-4.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libsnmp40-5.9.3-4.1.s390x", "product": { "name": "libsnmp40-5.9.3-4.1.s390x", "product_id": "libsnmp40-5.9.3-4.1.s390x" } }, { "category": "product_version", "name": "libsnmp40-32bit-5.9.3-4.1.s390x", "product": { "name": "libsnmp40-32bit-5.9.3-4.1.s390x", "product_id": "libsnmp40-32bit-5.9.3-4.1.s390x" } }, { "category": "product_version", "name": "net-snmp-5.9.3-4.1.s390x", "product": { "name": "net-snmp-5.9.3-4.1.s390x", "product_id": "net-snmp-5.9.3-4.1.s390x" } }, { "category": "product_version", "name": "net-snmp-devel-5.9.3-4.1.s390x", "product": { "name": "net-snmp-devel-5.9.3-4.1.s390x", "product_id": "net-snmp-devel-5.9.3-4.1.s390x" } }, { "category": "product_version", "name": "net-snmp-devel-32bit-5.9.3-4.1.s390x", "product": { "name": "net-snmp-devel-32bit-5.9.3-4.1.s390x", "product_id": "net-snmp-devel-32bit-5.9.3-4.1.s390x" } }, { "category": "product_version", "name": "perl-SNMP-5.9.3-4.1.s390x", "product": { "name": "perl-SNMP-5.9.3-4.1.s390x", "product_id": "perl-SNMP-5.9.3-4.1.s390x" } }, { "category": "product_version", "name": "python310-net-snmp-5.9.3-4.1.s390x", "product": { "name": "python310-net-snmp-5.9.3-4.1.s390x", "product_id": "python310-net-snmp-5.9.3-4.1.s390x" } }, { "category": "product_version", "name": "python38-net-snmp-5.9.3-4.1.s390x", "product": { "name": "python38-net-snmp-5.9.3-4.1.s390x", "product_id": "python38-net-snmp-5.9.3-4.1.s390x" } }, { "category": "product_version", "name": "python39-net-snmp-5.9.3-4.1.s390x", "product": { "name": "python39-net-snmp-5.9.3-4.1.s390x", "product_id": "python39-net-snmp-5.9.3-4.1.s390x" } }, { "category": "product_version", "name": "snmp-mibs-5.9.3-4.1.s390x", "product": { "name": "snmp-mibs-5.9.3-4.1.s390x", "product_id": "snmp-mibs-5.9.3-4.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libsnmp40-5.9.3-4.1.x86_64", "product": { "name": "libsnmp40-5.9.3-4.1.x86_64", "product_id": "libsnmp40-5.9.3-4.1.x86_64" } }, { "category": "product_version", "name": "libsnmp40-32bit-5.9.3-4.1.x86_64", "product": { "name": "libsnmp40-32bit-5.9.3-4.1.x86_64", "product_id": "libsnmp40-32bit-5.9.3-4.1.x86_64" } }, { "category": "product_version", "name": "net-snmp-5.9.3-4.1.x86_64", "product": { "name": "net-snmp-5.9.3-4.1.x86_64", "product_id": "net-snmp-5.9.3-4.1.x86_64" } }, { "category": "product_version", "name": "net-snmp-devel-5.9.3-4.1.x86_64", "product": { "name": "net-snmp-devel-5.9.3-4.1.x86_64", "product_id": "net-snmp-devel-5.9.3-4.1.x86_64" } }, { "category": "product_version", "name": "net-snmp-devel-32bit-5.9.3-4.1.x86_64", "product": { "name": "net-snmp-devel-32bit-5.9.3-4.1.x86_64", "product_id": "net-snmp-devel-32bit-5.9.3-4.1.x86_64" } }, { "category": "product_version", "name": "perl-SNMP-5.9.3-4.1.x86_64", "product": { "name": "perl-SNMP-5.9.3-4.1.x86_64", "product_id": "perl-SNMP-5.9.3-4.1.x86_64" } }, { "category": "product_version", "name": "python310-net-snmp-5.9.3-4.1.x86_64", "product": { "name": "python310-net-snmp-5.9.3-4.1.x86_64", "product_id": "python310-net-snmp-5.9.3-4.1.x86_64" } }, { "category": "product_version", "name": "python38-net-snmp-5.9.3-4.1.x86_64", "product": { "name": "python38-net-snmp-5.9.3-4.1.x86_64", "product_id": "python38-net-snmp-5.9.3-4.1.x86_64" } }, { "category": "product_version", "name": "python39-net-snmp-5.9.3-4.1.x86_64", "product": { "name": "python39-net-snmp-5.9.3-4.1.x86_64", "product_id": "python39-net-snmp-5.9.3-4.1.x86_64" } }, { "category": "product_version", "name": "snmp-mibs-5.9.3-4.1.x86_64", "product": { "name": "snmp-mibs-5.9.3-4.1.x86_64", "product_id": "snmp-mibs-5.9.3-4.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsnmp40-5.9.3-4.1.aarch64" }, "product_reference": "libsnmp40-5.9.3-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsnmp40-5.9.3-4.1.ppc64le" }, "product_reference": "libsnmp40-5.9.3-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsnmp40-5.9.3-4.1.s390x" }, "product_reference": "libsnmp40-5.9.3-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsnmp40-5.9.3-4.1.x86_64" }, "product_reference": "libsnmp40-5.9.3-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-32bit-5.9.3-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsnmp40-32bit-5.9.3-4.1.aarch64" }, "product_reference": "libsnmp40-32bit-5.9.3-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-32bit-5.9.3-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsnmp40-32bit-5.9.3-4.1.ppc64le" }, "product_reference": "libsnmp40-32bit-5.9.3-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-32bit-5.9.3-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsnmp40-32bit-5.9.3-4.1.s390x" }, "product_reference": "libsnmp40-32bit-5.9.3-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-32bit-5.9.3-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libsnmp40-32bit-5.9.3-4.1.x86_64" }, "product_reference": "libsnmp40-32bit-5.9.3-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.9.3-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:net-snmp-5.9.3-4.1.aarch64" }, "product_reference": "net-snmp-5.9.3-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.9.3-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:net-snmp-5.9.3-4.1.ppc64le" }, "product_reference": "net-snmp-5.9.3-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.9.3-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:net-snmp-5.9.3-4.1.s390x" }, "product_reference": "net-snmp-5.9.3-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.9.3-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:net-snmp-5.9.3-4.1.x86_64" }, "product_reference": "net-snmp-5.9.3-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.9.3-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:net-snmp-devel-5.9.3-4.1.aarch64" }, "product_reference": "net-snmp-devel-5.9.3-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.9.3-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:net-snmp-devel-5.9.3-4.1.ppc64le" }, "product_reference": "net-snmp-devel-5.9.3-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.9.3-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:net-snmp-devel-5.9.3-4.1.s390x" }, "product_reference": "net-snmp-devel-5.9.3-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.9.3-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:net-snmp-devel-5.9.3-4.1.x86_64" }, "product_reference": "net-snmp-devel-5.9.3-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-32bit-5.9.3-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.3-4.1.aarch64" }, "product_reference": "net-snmp-devel-32bit-5.9.3-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-32bit-5.9.3-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.3-4.1.ppc64le" }, "product_reference": "net-snmp-devel-32bit-5.9.3-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-32bit-5.9.3-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.3-4.1.s390x" }, "product_reference": "net-snmp-devel-32bit-5.9.3-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-32bit-5.9.3-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.3-4.1.x86_64" }, "product_reference": "net-snmp-devel-32bit-5.9.3-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.9.3-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-SNMP-5.9.3-4.1.aarch64" }, "product_reference": "perl-SNMP-5.9.3-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.9.3-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-SNMP-5.9.3-4.1.ppc64le" }, "product_reference": "perl-SNMP-5.9.3-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.9.3-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-SNMP-5.9.3-4.1.s390x" }, "product_reference": "perl-SNMP-5.9.3-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.9.3-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-SNMP-5.9.3-4.1.x86_64" }, "product_reference": "perl-SNMP-5.9.3-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python310-net-snmp-5.9.3-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python310-net-snmp-5.9.3-4.1.aarch64" }, "product_reference": "python310-net-snmp-5.9.3-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python310-net-snmp-5.9.3-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python310-net-snmp-5.9.3-4.1.ppc64le" }, "product_reference": "python310-net-snmp-5.9.3-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python310-net-snmp-5.9.3-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python310-net-snmp-5.9.3-4.1.s390x" }, "product_reference": "python310-net-snmp-5.9.3-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python310-net-snmp-5.9.3-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python310-net-snmp-5.9.3-4.1.x86_64" }, "product_reference": "python310-net-snmp-5.9.3-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python38-net-snmp-5.9.3-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python38-net-snmp-5.9.3-4.1.aarch64" }, "product_reference": "python38-net-snmp-5.9.3-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python38-net-snmp-5.9.3-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python38-net-snmp-5.9.3-4.1.ppc64le" }, "product_reference": "python38-net-snmp-5.9.3-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python38-net-snmp-5.9.3-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python38-net-snmp-5.9.3-4.1.s390x" }, "product_reference": "python38-net-snmp-5.9.3-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python38-net-snmp-5.9.3-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python38-net-snmp-5.9.3-4.1.x86_64" }, "product_reference": "python38-net-snmp-5.9.3-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python39-net-snmp-5.9.3-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python39-net-snmp-5.9.3-4.1.aarch64" }, "product_reference": "python39-net-snmp-5.9.3-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python39-net-snmp-5.9.3-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python39-net-snmp-5.9.3-4.1.ppc64le" }, "product_reference": "python39-net-snmp-5.9.3-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python39-net-snmp-5.9.3-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python39-net-snmp-5.9.3-4.1.s390x" }, "product_reference": "python39-net-snmp-5.9.3-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "python39-net-snmp-5.9.3-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:python39-net-snmp-5.9.3-4.1.x86_64" }, "product_reference": "python39-net-snmp-5.9.3-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:snmp-mibs-5.9.3-4.1.aarch64" }, "product_reference": "snmp-mibs-5.9.3-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:snmp-mibs-5.9.3-4.1.ppc64le" }, "product_reference": "snmp-mibs-5.9.3-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:snmp-mibs-5.9.3-4.1.s390x" }, "product_reference": "snmp-mibs-5.9.3-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:snmp-mibs-5.9.3-4.1.x86_64" }, "product_reference": "snmp-mibs-5.9.3-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-44793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44793" } ], "notes": [ { "category": "general", "text": "handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libsnmp40-32bit-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:libsnmp40-32bit-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:libsnmp40-32bit-5.9.3-4.1.s390x", "openSUSE Tumbleweed:libsnmp40-32bit-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:libsnmp40-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:libsnmp40-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:libsnmp40-5.9.3-4.1.s390x", "openSUSE Tumbleweed:libsnmp40-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:net-snmp-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:net-snmp-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:net-snmp-5.9.3-4.1.s390x", "openSUSE Tumbleweed:net-snmp-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.3-4.1.s390x", "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:net-snmp-devel-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:net-snmp-devel-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:net-snmp-devel-5.9.3-4.1.s390x", "openSUSE Tumbleweed:net-snmp-devel-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:perl-SNMP-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:perl-SNMP-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:perl-SNMP-5.9.3-4.1.s390x", "openSUSE Tumbleweed:perl-SNMP-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:python310-net-snmp-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:python310-net-snmp-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:python310-net-snmp-5.9.3-4.1.s390x", "openSUSE Tumbleweed:python310-net-snmp-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:python38-net-snmp-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:python38-net-snmp-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:python38-net-snmp-5.9.3-4.1.s390x", "openSUSE Tumbleweed:python38-net-snmp-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:python39-net-snmp-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:python39-net-snmp-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:python39-net-snmp-5.9.3-4.1.s390x", "openSUSE Tumbleweed:python39-net-snmp-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:snmp-mibs-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:snmp-mibs-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:snmp-mibs-5.9.3-4.1.s390x", "openSUSE Tumbleweed:snmp-mibs-5.9.3-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44793", "url": "https://www.suse.com/security/cve/CVE-2022-44793" }, { "category": "external", "summary": "SUSE Bug 1205148 for CVE-2022-44793", "url": "https://bugzilla.suse.com/1205148" }, { "category": "external", "summary": "SUSE Bug 1207896 for CVE-2022-44793", "url": "https://bugzilla.suse.com/1207896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libsnmp40-32bit-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:libsnmp40-32bit-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:libsnmp40-32bit-5.9.3-4.1.s390x", "openSUSE Tumbleweed:libsnmp40-32bit-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:libsnmp40-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:libsnmp40-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:libsnmp40-5.9.3-4.1.s390x", "openSUSE Tumbleweed:libsnmp40-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:net-snmp-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:net-snmp-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:net-snmp-5.9.3-4.1.s390x", "openSUSE Tumbleweed:net-snmp-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.3-4.1.s390x", "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:net-snmp-devel-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:net-snmp-devel-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:net-snmp-devel-5.9.3-4.1.s390x", "openSUSE Tumbleweed:net-snmp-devel-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:perl-SNMP-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:perl-SNMP-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:perl-SNMP-5.9.3-4.1.s390x", "openSUSE Tumbleweed:perl-SNMP-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:python310-net-snmp-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:python310-net-snmp-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:python310-net-snmp-5.9.3-4.1.s390x", "openSUSE Tumbleweed:python310-net-snmp-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:python38-net-snmp-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:python38-net-snmp-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:python38-net-snmp-5.9.3-4.1.s390x", "openSUSE Tumbleweed:python38-net-snmp-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:python39-net-snmp-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:python39-net-snmp-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:python39-net-snmp-5.9.3-4.1.s390x", "openSUSE Tumbleweed:python39-net-snmp-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:snmp-mibs-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:snmp-mibs-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:snmp-mibs-5.9.3-4.1.s390x", "openSUSE Tumbleweed:snmp-mibs-5.9.3-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libsnmp40-32bit-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:libsnmp40-32bit-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:libsnmp40-32bit-5.9.3-4.1.s390x", "openSUSE Tumbleweed:libsnmp40-32bit-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:libsnmp40-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:libsnmp40-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:libsnmp40-5.9.3-4.1.s390x", "openSUSE Tumbleweed:libsnmp40-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:net-snmp-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:net-snmp-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:net-snmp-5.9.3-4.1.s390x", "openSUSE Tumbleweed:net-snmp-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.3-4.1.s390x", "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:net-snmp-devel-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:net-snmp-devel-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:net-snmp-devel-5.9.3-4.1.s390x", "openSUSE Tumbleweed:net-snmp-devel-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:perl-SNMP-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:perl-SNMP-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:perl-SNMP-5.9.3-4.1.s390x", "openSUSE Tumbleweed:perl-SNMP-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:python310-net-snmp-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:python310-net-snmp-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:python310-net-snmp-5.9.3-4.1.s390x", "openSUSE Tumbleweed:python310-net-snmp-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:python38-net-snmp-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:python38-net-snmp-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:python38-net-snmp-5.9.3-4.1.s390x", "openSUSE Tumbleweed:python38-net-snmp-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:python39-net-snmp-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:python39-net-snmp-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:python39-net-snmp-5.9.3-4.1.s390x", "openSUSE Tumbleweed:python39-net-snmp-5.9.3-4.1.x86_64", "openSUSE Tumbleweed:snmp-mibs-5.9.3-4.1.aarch64", "openSUSE Tumbleweed:snmp-mibs-5.9.3-4.1.ppc64le", "openSUSE Tumbleweed:snmp-mibs-5.9.3-4.1.s390x", "openSUSE Tumbleweed:snmp-mibs-5.9.3-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44793" } ] }
fkie_cve-2022-44793
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
URL | Tags | ||
---|---|---|---|
cve@mitre.org | https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f | Exploit, Third Party Advisory | |
cve@mitre.org | https://github.com/net-snmp/net-snmp/issues/475 | Exploit, Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20230223-0011/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/net-snmp/net-snmp/issues/475 | Exploit, Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20230223-0011/ | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
net-snmp | net-snmp | * | |
debian | debian_linux | 10.0 | |
netapp | h300s_firmware | - | |
netapp | h300s | - | |
netapp | h500s_firmware | - | |
netapp | h500s | - | |
netapp | h700s_firmware | - | |
netapp | h700s | - | |
netapp | h410s_firmware | - | |
netapp | h410s | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*", "matchCriteriaId": "97E267EC-2F41-4233-8647-3BE21B487713", "versionEndIncluding": "5.9.3", "versionStartIncluding": "5.4.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service." }, { "lang": "es", "value": "handle_ipv6IpForwarding en agent/mibgroup/ip-mib/ip_scalars.c en Net-SNMP 5.4.3 a 5.9.3 tiene un error de excepci\u00f3n de puntero NULL que puede ser utilizado por un atacante remoto para provocar que la instancia se bloquee a trav\u00e9s de un paquete UDP manipulado. resultando en Denegaci\u00f3n de Servicio." } ], "id": "CVE-2022-44793", "lastModified": "2025-05-05T16:15:22.427", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-11-07T03:15:09.363", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/net-snmp/net-snmp/issues/475" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230223-0011/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/net-snmp/net-snmp/issues/475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230223-0011/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
rhsa-2023_2969
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for net-snmp is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.\n\nSecurity Fix(es):\n\n* net-snmp: NULL Pointer Exception when handling ipDefaultTTL (CVE-2022-44792)\n\n* net-snmp: NULL Pointer Exception when handling pv6IpForwarding (CVE-2022-44793)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:2969", "url": "https://access.redhat.com/errata/RHSA-2023:2969" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index" }, { "category": "external", "summary": "2105957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105957" }, { "category": "external", "summary": "2134635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134635" }, { "category": "external", "summary": "2141897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141897" }, { "category": "external", "summary": "2141898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141898" }, { "category": "external", "summary": "2151537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151537" }, { "category": "external", "summary": "2160723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160723" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2969.json" } ], "title": "Red Hat Security Advisory: net-snmp security and bug fix update", "tracking": { "current_release_date": "2024-11-22T20:38:24+00:00", "generator": { "date": "2024-11-22T20:38:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:2969", "initial_release_date": "2023-05-16T08:37:22+00:00", "revision_history": [ { "date": "2023-05-16T08:37:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-05-16T08:37:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T20:38:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-1:5.8-27.el8.aarch64", "product_id": "net-snmp-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-agent-libs-1:5.8-27.el8.aarch64", "product_id": "net-snmp-agent-libs-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-devel-1:5.8-27.el8.aarch64", "product_id": "net-snmp-devel-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-perl-1:5.8-27.el8.aarch64", "product_id": "net-snmp-perl-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-utils-1:5.8-27.el8.aarch64", "product_id": "net-snmp-utils-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-debugsource-1:5.8-27.el8.aarch64", "product_id": "net-snmp-debugsource-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "product_id": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-debuginfo-1:5.8-27.el8.aarch64", "product_id": "net-snmp-debuginfo-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "product_id": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "product_id": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "product_id": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-libs-1:5.8-27.el8.aarch64", "product_id": "net-snmp-libs-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.8-27.el8?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-devel-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-devel-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-perl-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-perl-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-utils-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-utils-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-debugsource-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-debugsource-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-libs-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-libs-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-1:5.8-27.el8.x86_64", "product_id": "net-snmp-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-agent-libs-1:5.8-27.el8.x86_64", "product_id": "net-snmp-agent-libs-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-devel-1:5.8-27.el8.x86_64", "product_id": "net-snmp-devel-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-perl-1:5.8-27.el8.x86_64", "product_id": "net-snmp-perl-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-utils-1:5.8-27.el8.x86_64", "product_id": "net-snmp-utils-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-debugsource-1:5.8-27.el8.x86_64", "product_id": "net-snmp-debugsource-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "product_id": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-debuginfo-1:5.8-27.el8.x86_64", "product_id": "net-snmp-debuginfo-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "product_id": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "product_id": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "product_id": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-libs-1:5.8-27.el8.x86_64", "product_id": "net-snmp-libs-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.8-27.el8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-agent-libs-1:5.8-27.el8.i686", "product": { "name": "net-snmp-agent-libs-1:5.8-27.el8.i686", "product_id": "net-snmp-agent-libs-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.8-27.el8.i686", "product": { "name": "net-snmp-devel-1:5.8-27.el8.i686", "product_id": "net-snmp-devel-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.8-27.el8.i686", "product": { "name": "net-snmp-debugsource-1:5.8-27.el8.i686", "product_id": "net-snmp-debugsource-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "product_id": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.8-27.el8.i686", "product": { "name": "net-snmp-debuginfo-1:5.8-27.el8.i686", "product_id": "net-snmp-debuginfo-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "product": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "product_id": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "product": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "product_id": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "product": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "product_id": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.8-27.el8.i686", "product": { "name": "net-snmp-libs-1:5.8-27.el8.i686", "product_id": "net-snmp-libs-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.8-27.el8?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-1:5.8-27.el8.s390x", "product_id": "net-snmp-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-agent-libs-1:5.8-27.el8.s390x", "product_id": "net-snmp-agent-libs-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-devel-1:5.8-27.el8.s390x", "product_id": "net-snmp-devel-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-perl-1:5.8-27.el8.s390x", "product_id": "net-snmp-perl-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-utils-1:5.8-27.el8.s390x", "product_id": "net-snmp-utils-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-debugsource-1:5.8-27.el8.s390x", "product_id": "net-snmp-debugsource-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "product_id": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-debuginfo-1:5.8-27.el8.s390x", "product_id": "net-snmp-debuginfo-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "product_id": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "product_id": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "product_id": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-libs-1:5.8-27.el8.s390x", "product_id": "net-snmp-libs-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.8-27.el8?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.8-27.el8.src", "product": { "name": "net-snmp-1:5.8-27.el8.src", "product_id": "net-snmp-1:5.8-27.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.8-27.el8?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src" }, "product_reference": "net-snmp-1:5.8-27.el8.src", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src" }, "product_reference": "net-snmp-1:5.8-27.el8.src", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-44792", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-11-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141897" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Net-SNMP. This issue occurs because the handle_ipDefaultTTL function in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP has a NULL Pointer Exception flaw that allows a remote attacker (who has to write access) to cause the instance to crash via a crafted UDP packet, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "net-snmp: NULL Pointer Exception when handling ipDefaultTTL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-44792" }, { "category": "external", "summary": "RHBZ#2141897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141897" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-44792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44792" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-44792", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44792" } ], "release_date": "2022-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-16T08:37:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "net-snmp: NULL Pointer Exception when handling ipDefaultTTL" }, { "cve": "CVE-2022-44793", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-11-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141898" } ], "notes": [ { "category": "description", "text": "A flaw was found in Net-SNMP. This issue occurs because the handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP has a NULL Pointer Exception that could allow a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "net-snmp: NULL Pointer Exception when handling pv6IpForwarding", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-44793" }, { "category": "external", "summary": "RHBZ#2141898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-44793", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44793" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-44793", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44793" } ], "release_date": "2022-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-16T08:37:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "net-snmp: NULL Pointer Exception when handling pv6IpForwarding" } ] }
rhsa-2023:2444
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for net-snmp is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.\n\nSecurity Fix(es):\n\n* net-snmp: NULL Pointer Exception when handling ipDefaultTTL (CVE-2022-44792)\n\n* net-snmp: NULL Pointer Exception when handling pv6IpForwarding (CVE-2022-44793)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:2444", "url": "https://access.redhat.com/errata/RHSA-2023:2444" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index" }, { "category": "external", "summary": "2141897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141897" }, { "category": "external", "summary": "2141898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141898" }, { "category": "external", "summary": "2151540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151540" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2444.json" } ], "title": "Red Hat Security Advisory: net-snmp security and bug fix update", "tracking": { "current_release_date": "2025-10-09T22:42:35+00:00", "generator": { "date": "2025-10-09T22:42:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2023:2444", "initial_release_date": "2023-05-09T10:03:11+00:00", "revision_history": [ { "date": "2023-05-09T10:03:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-05-09T10:03:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T22:42:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.9.1-9.el9.src", "product": { "name": "net-snmp-1:5.9.1-9.el9.src", "product_id": "net-snmp-1:5.9.1-9.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.9.1-9.el9?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-devel-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-devel-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-libs-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-libs-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-perl-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-perl-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-utils-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-utils-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-1:5.9.1-9.el9.aarch64", "product": { "name": "python3-net-snmp-1:5.9.1-9.el9.aarch64", "product_id": "python3-net-snmp-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-devel-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-devel-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-libs-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-libs-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-perl-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-perl-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-utils-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-utils-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-1:5.9.1-9.el9.ppc64le", "product": { "name": "python3-net-snmp-1:5.9.1-9.el9.ppc64le", "product_id": "python3-net-snmp-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-devel-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-devel-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-libs-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-libs-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-perl-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-perl-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-utils-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-utils-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-1:5.9.1-9.el9.x86_64", "product": { "name": "python3-net-snmp-1:5.9.1-9.el9.x86_64", "product_id": "python3-net-snmp-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-agent-libs-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.i686", "product_id": "net-snmp-agent-libs-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-devel-1:5.9.1-9.el9.i686", "product_id": "net-snmp-devel-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-libs-1:5.9.1-9.el9.i686", "product_id": "net-snmp-libs-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.i686", "product_id": "net-snmp-debugsource-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product_id": "net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "product_id": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "product_id": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "product_id": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product_id": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-devel-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-devel-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-libs-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-libs-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-perl-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-perl-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-utils-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-utils-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-1:5.9.1-9.el9.s390x", "product": { "name": "python3-net-snmp-1:5.9.1-9.el9.s390x", "product_id": "python3-net-snmp-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-debugsource-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.9.1-9.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src" }, "product_reference": "net-snmp-1:5.9.1-9.el9.src", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-agent-libs-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-debugsource-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-debugsource-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-devel-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-devel-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-devel-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-devel-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-devel-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-libs-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-libs-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-libs-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-libs-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-libs-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-perl-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-perl-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-perl-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-perl-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-utils-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-utils-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-utils-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-utils-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64" }, "product_reference": "python3-net-snmp-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le" }, "product_reference": "python3-net-snmp-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x" }, "product_reference": "python3-net-snmp-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64" }, "product_reference": "python3-net-snmp-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-44792", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-11-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141897" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Net-SNMP. This issue occurs because the handle_ipDefaultTTL function in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP has a NULL Pointer Exception flaw that allows a remote attacker (who has to write access) to cause the instance to crash via a crafted UDP packet, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "net-snmp: NULL Pointer Exception when handling ipDefaultTTL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-44792" }, { "category": "external", "summary": "RHBZ#2141897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141897" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-44792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44792" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-44792", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44792" } ], "release_date": "2022-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:03:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2444" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "net-snmp: NULL Pointer Exception when handling ipDefaultTTL" }, { "cve": "CVE-2022-44793", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-11-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141898" } ], "notes": [ { "category": "description", "text": "A flaw was found in Net-SNMP. This issue occurs because the handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP has a NULL Pointer Exception that could allow a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "net-snmp: NULL Pointer Exception when handling pv6IpForwarding", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-44793" }, { "category": "external", "summary": "RHBZ#2141898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-44793", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44793" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-44793", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44793" } ], "release_date": "2022-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:03:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2444" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "net-snmp: NULL Pointer Exception when handling pv6IpForwarding" } ] }
rhsa-2023_2444
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for net-snmp is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.\n\nSecurity Fix(es):\n\n* net-snmp: NULL Pointer Exception when handling ipDefaultTTL (CVE-2022-44792)\n\n* net-snmp: NULL Pointer Exception when handling pv6IpForwarding (CVE-2022-44793)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:2444", "url": "https://access.redhat.com/errata/RHSA-2023:2444" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index" }, { "category": "external", "summary": "2141897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141897" }, { "category": "external", "summary": "2141898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141898" }, { "category": "external", "summary": "2151540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151540" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2444.json" } ], "title": "Red Hat Security Advisory: net-snmp security and bug fix update", "tracking": { "current_release_date": "2024-11-22T20:38:10+00:00", "generator": { "date": "2024-11-22T20:38:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:2444", "initial_release_date": "2023-05-09T10:03:11+00:00", "revision_history": [ { "date": "2023-05-09T10:03:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-05-09T10:03:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T20:38:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.9.1-9.el9.src", "product": { "name": "net-snmp-1:5.9.1-9.el9.src", "product_id": "net-snmp-1:5.9.1-9.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.9.1-9.el9?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-devel-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-devel-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-libs-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-libs-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-perl-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-perl-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-utils-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-utils-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-1:5.9.1-9.el9.aarch64", "product": { "name": "python3-net-snmp-1:5.9.1-9.el9.aarch64", "product_id": "python3-net-snmp-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-devel-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-devel-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-libs-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-libs-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-perl-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-perl-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-utils-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-utils-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-1:5.9.1-9.el9.ppc64le", "product": { "name": "python3-net-snmp-1:5.9.1-9.el9.ppc64le", "product_id": "python3-net-snmp-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-devel-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-devel-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-libs-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-libs-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-perl-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-perl-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-utils-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-utils-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-1:5.9.1-9.el9.x86_64", "product": { "name": "python3-net-snmp-1:5.9.1-9.el9.x86_64", "product_id": "python3-net-snmp-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-agent-libs-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.i686", "product_id": "net-snmp-agent-libs-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-devel-1:5.9.1-9.el9.i686", "product_id": "net-snmp-devel-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-libs-1:5.9.1-9.el9.i686", "product_id": "net-snmp-libs-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.i686", "product_id": "net-snmp-debugsource-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product_id": "net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "product_id": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "product_id": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "product_id": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product_id": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-devel-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-devel-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-libs-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-libs-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-perl-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-perl-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-utils-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-utils-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-1:5.9.1-9.el9.s390x", "product": { "name": "python3-net-snmp-1:5.9.1-9.el9.s390x", "product_id": "python3-net-snmp-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-debugsource-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.9.1-9.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src" }, "product_reference": "net-snmp-1:5.9.1-9.el9.src", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-agent-libs-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-debugsource-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-debugsource-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-devel-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-devel-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-devel-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-devel-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-devel-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-libs-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-libs-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-libs-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-libs-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-libs-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-perl-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-perl-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-perl-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-perl-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-utils-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-utils-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-utils-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-utils-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64" }, "product_reference": "python3-net-snmp-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le" }, "product_reference": "python3-net-snmp-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x" }, "product_reference": "python3-net-snmp-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64" }, "product_reference": "python3-net-snmp-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-44792", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-11-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141897" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Net-SNMP. This issue occurs because the handle_ipDefaultTTL function in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP has a NULL Pointer Exception flaw that allows a remote attacker (who has to write access) to cause the instance to crash via a crafted UDP packet, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "net-snmp: NULL Pointer Exception when handling ipDefaultTTL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-44792" }, { "category": "external", "summary": "RHBZ#2141897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141897" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-44792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44792" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-44792", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44792" } ], "release_date": "2022-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:03:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2444" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "net-snmp: NULL Pointer Exception when handling ipDefaultTTL" }, { "cve": "CVE-2022-44793", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-11-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141898" } ], "notes": [ { "category": "description", "text": "A flaw was found in Net-SNMP. This issue occurs because the handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP has a NULL Pointer Exception that could allow a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "net-snmp: NULL Pointer Exception when handling pv6IpForwarding", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-44793" }, { "category": "external", "summary": "RHBZ#2141898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-44793", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44793" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-44793", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44793" } ], "release_date": "2022-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:03:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2444" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "net-snmp: NULL Pointer Exception when handling pv6IpForwarding" } ] }
RHSA-2023:2444
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for net-snmp is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.\n\nSecurity Fix(es):\n\n* net-snmp: NULL Pointer Exception when handling ipDefaultTTL (CVE-2022-44792)\n\n* net-snmp: NULL Pointer Exception when handling pv6IpForwarding (CVE-2022-44793)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:2444", "url": "https://access.redhat.com/errata/RHSA-2023:2444" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index" }, { "category": "external", "summary": "2141897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141897" }, { "category": "external", "summary": "2141898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141898" }, { "category": "external", "summary": "2151540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151540" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2444.json" } ], "title": "Red Hat Security Advisory: net-snmp security and bug fix update", "tracking": { "current_release_date": "2025-10-09T22:42:35+00:00", "generator": { "date": "2025-10-09T22:42:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2023:2444", "initial_release_date": "2023-05-09T10:03:11+00:00", "revision_history": [ { "date": "2023-05-09T10:03:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-05-09T10:03:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T22:42:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.9.1-9.el9.src", "product": { "name": "net-snmp-1:5.9.1-9.el9.src", "product_id": "net-snmp-1:5.9.1-9.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.9.1-9.el9?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-devel-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-devel-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-libs-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-libs-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-perl-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-perl-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-utils-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-utils-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-1:5.9.1-9.el9.aarch64", "product": { "name": "python3-net-snmp-1:5.9.1-9.el9.aarch64", "product_id": "python3-net-snmp-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product_id": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-9.el9?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-devel-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-devel-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-libs-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-libs-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-perl-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-perl-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-utils-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-utils-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-1:5.9.1-9.el9.ppc64le", "product": { "name": "python3-net-snmp-1:5.9.1-9.el9.ppc64le", "product_id": "python3-net-snmp-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product_id": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-9.el9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-devel-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-devel-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-libs-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-libs-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-perl-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-perl-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-utils-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-utils-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-1:5.9.1-9.el9.x86_64", "product": { "name": "python3-net-snmp-1:5.9.1-9.el9.x86_64", "product_id": "python3-net-snmp-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product_id": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-9.el9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-agent-libs-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.i686", "product_id": "net-snmp-agent-libs-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-devel-1:5.9.1-9.el9.i686", "product_id": "net-snmp-devel-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-libs-1:5.9.1-9.el9.i686", "product_id": "net-snmp-libs-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.i686", "product_id": "net-snmp-debugsource-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product_id": "net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "product_id": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "product_id": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "product_id": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product_id": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-9.el9?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-devel-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-devel-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-libs-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-libs-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-perl-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-perl-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-utils-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-utils-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-1:5.9.1-9.el9.s390x", "product": { "name": "python3-net-snmp-1:5.9.1-9.el9.s390x", "product_id": "python3-net-snmp-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-debugsource-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product_id": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-net-snmp-debuginfo@5.9.1-9.el9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.9.1-9.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src" }, "product_reference": "net-snmp-1:5.9.1-9.el9.src", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-agent-libs-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-debugsource-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-debugsource-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-devel-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-devel-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-devel-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-devel-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-devel-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-libs-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-libs-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-libs-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-libs-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-libs-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-perl-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-perl-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-perl-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-perl-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-utils-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-utils-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-utils-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-utils-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64" }, "product_reference": "python3-net-snmp-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le" }, "product_reference": "python3-net-snmp-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x" }, "product_reference": "python3-net-snmp-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64" }, "product_reference": "python3-net-snmp-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64" }, "product_reference": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686" }, "product_reference": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le" }, "product_reference": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x" }, "product_reference": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "relates_to_product_reference": "AppStream-9.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" }, "product_reference": "python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "relates_to_product_reference": "AppStream-9.2.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-44792", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-11-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141897" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Net-SNMP. This issue occurs because the handle_ipDefaultTTL function in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP has a NULL Pointer Exception flaw that allows a remote attacker (who has to write access) to cause the instance to crash via a crafted UDP packet, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "net-snmp: NULL Pointer Exception when handling ipDefaultTTL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-44792" }, { "category": "external", "summary": "RHBZ#2141897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141897" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-44792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44792" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-44792", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44792" } ], "release_date": "2022-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:03:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2444" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "net-snmp: NULL Pointer Exception when handling ipDefaultTTL" }, { "cve": "CVE-2022-44793", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-11-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141898" } ], "notes": [ { "category": "description", "text": "A flaw was found in Net-SNMP. This issue occurs because the handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP has a NULL Pointer Exception that could allow a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "net-snmp: NULL Pointer Exception when handling pv6IpForwarding", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-44793" }, { "category": "external", "summary": "RHBZ#2141898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-44793", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44793" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-44793", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44793" } ], "release_date": "2022-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-09T10:03:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2444" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.src", "AppStream-9.2.0.GA:net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-agent-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-debugsource-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-devel-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-libs-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-perl-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:net-snmp-utils-debuginfo-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-1:5.9.1-9.el9.x86_64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.aarch64", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.i686", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.ppc64le", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.s390x", "AppStream-9.2.0.GA:python3-net-snmp-debuginfo-1:5.9.1-9.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "net-snmp: NULL Pointer Exception when handling pv6IpForwarding" } ] }
RHSA-2023:2969
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for net-snmp is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.\n\nSecurity Fix(es):\n\n* net-snmp: NULL Pointer Exception when handling ipDefaultTTL (CVE-2022-44792)\n\n* net-snmp: NULL Pointer Exception when handling pv6IpForwarding (CVE-2022-44793)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:2969", "url": "https://access.redhat.com/errata/RHSA-2023:2969" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index" }, { "category": "external", "summary": "2105957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105957" }, { "category": "external", "summary": "2134635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134635" }, { "category": "external", "summary": "2141897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141897" }, { "category": "external", "summary": "2141898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141898" }, { "category": "external", "summary": "2151537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151537" }, { "category": "external", "summary": "2160723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160723" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2969.json" } ], "title": "Red Hat Security Advisory: net-snmp security and bug fix update", "tracking": { "current_release_date": "2025-10-09T22:42:40+00:00", "generator": { "date": "2025-10-09T22:42:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2023:2969", "initial_release_date": "2023-05-16T08:37:22+00:00", "revision_history": [ { "date": "2023-05-16T08:37:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-05-16T08:37:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T22:42:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-1:5.8-27.el8.aarch64", "product_id": "net-snmp-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-agent-libs-1:5.8-27.el8.aarch64", "product_id": "net-snmp-agent-libs-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-devel-1:5.8-27.el8.aarch64", "product_id": "net-snmp-devel-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-perl-1:5.8-27.el8.aarch64", "product_id": "net-snmp-perl-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-utils-1:5.8-27.el8.aarch64", "product_id": "net-snmp-utils-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-debugsource-1:5.8-27.el8.aarch64", "product_id": "net-snmp-debugsource-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "product_id": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-debuginfo-1:5.8-27.el8.aarch64", "product_id": "net-snmp-debuginfo-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "product_id": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "product_id": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "product_id": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-libs-1:5.8-27.el8.aarch64", "product_id": "net-snmp-libs-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.8-27.el8?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-devel-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-devel-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-perl-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-perl-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-utils-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-utils-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-debugsource-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-debugsource-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-libs-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-libs-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-1:5.8-27.el8.x86_64", "product_id": "net-snmp-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-agent-libs-1:5.8-27.el8.x86_64", "product_id": "net-snmp-agent-libs-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-devel-1:5.8-27.el8.x86_64", "product_id": "net-snmp-devel-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-perl-1:5.8-27.el8.x86_64", "product_id": "net-snmp-perl-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-utils-1:5.8-27.el8.x86_64", "product_id": "net-snmp-utils-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-debugsource-1:5.8-27.el8.x86_64", "product_id": "net-snmp-debugsource-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "product_id": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-debuginfo-1:5.8-27.el8.x86_64", "product_id": "net-snmp-debuginfo-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "product_id": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "product_id": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "product_id": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-libs-1:5.8-27.el8.x86_64", "product_id": "net-snmp-libs-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.8-27.el8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-agent-libs-1:5.8-27.el8.i686", "product": { "name": "net-snmp-agent-libs-1:5.8-27.el8.i686", "product_id": "net-snmp-agent-libs-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.8-27.el8.i686", "product": { "name": "net-snmp-devel-1:5.8-27.el8.i686", "product_id": "net-snmp-devel-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.8-27.el8.i686", "product": { "name": "net-snmp-debugsource-1:5.8-27.el8.i686", "product_id": "net-snmp-debugsource-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "product_id": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.8-27.el8.i686", "product": { "name": "net-snmp-debuginfo-1:5.8-27.el8.i686", "product_id": "net-snmp-debuginfo-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "product": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "product_id": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "product": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "product_id": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "product": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "product_id": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.8-27.el8.i686", "product": { "name": "net-snmp-libs-1:5.8-27.el8.i686", "product_id": "net-snmp-libs-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.8-27.el8?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-1:5.8-27.el8.s390x", "product_id": "net-snmp-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-agent-libs-1:5.8-27.el8.s390x", "product_id": "net-snmp-agent-libs-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-devel-1:5.8-27.el8.s390x", "product_id": "net-snmp-devel-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-perl-1:5.8-27.el8.s390x", "product_id": "net-snmp-perl-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-utils-1:5.8-27.el8.s390x", "product_id": "net-snmp-utils-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-debugsource-1:5.8-27.el8.s390x", "product_id": "net-snmp-debugsource-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "product_id": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-debuginfo-1:5.8-27.el8.s390x", "product_id": "net-snmp-debuginfo-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "product_id": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "product_id": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "product_id": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-libs-1:5.8-27.el8.s390x", "product_id": "net-snmp-libs-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.8-27.el8?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.8-27.el8.src", "product": { "name": "net-snmp-1:5.8-27.el8.src", "product_id": "net-snmp-1:5.8-27.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.8-27.el8?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src" }, "product_reference": "net-snmp-1:5.8-27.el8.src", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src" }, "product_reference": "net-snmp-1:5.8-27.el8.src", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-44792", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-11-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141897" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Net-SNMP. This issue occurs because the handle_ipDefaultTTL function in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP has a NULL Pointer Exception flaw that allows a remote attacker (who has to write access) to cause the instance to crash via a crafted UDP packet, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "net-snmp: NULL Pointer Exception when handling ipDefaultTTL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-44792" }, { "category": "external", "summary": "RHBZ#2141897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141897" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-44792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44792" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-44792", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44792" } ], "release_date": "2022-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-16T08:37:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "net-snmp: NULL Pointer Exception when handling ipDefaultTTL" }, { "cve": "CVE-2022-44793", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-11-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141898" } ], "notes": [ { "category": "description", "text": "A flaw was found in Net-SNMP. This issue occurs because the handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP has a NULL Pointer Exception that could allow a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "net-snmp: NULL Pointer Exception when handling pv6IpForwarding", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-44793" }, { "category": "external", "summary": "RHBZ#2141898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-44793", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44793" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-44793", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44793" } ], "release_date": "2022-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-16T08:37:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "net-snmp: NULL Pointer Exception when handling pv6IpForwarding" } ] }
rhsa-2023:2969
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for net-snmp is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.\n\nSecurity Fix(es):\n\n* net-snmp: NULL Pointer Exception when handling ipDefaultTTL (CVE-2022-44792)\n\n* net-snmp: NULL Pointer Exception when handling pv6IpForwarding (CVE-2022-44793)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:2969", "url": "https://access.redhat.com/errata/RHSA-2023:2969" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index" }, { "category": "external", "summary": "2105957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105957" }, { "category": "external", "summary": "2134635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134635" }, { "category": "external", "summary": "2141897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141897" }, { "category": "external", "summary": "2141898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141898" }, { "category": "external", "summary": "2151537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151537" }, { "category": "external", "summary": "2160723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160723" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2969.json" } ], "title": "Red Hat Security Advisory: net-snmp security and bug fix update", "tracking": { "current_release_date": "2025-10-09T22:42:40+00:00", "generator": { "date": "2025-10-09T22:42:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2023:2969", "initial_release_date": "2023-05-16T08:37:22+00:00", "revision_history": [ { "date": "2023-05-16T08:37:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-05-16T08:37:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T22:42:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-1:5.8-27.el8.aarch64", "product_id": "net-snmp-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-agent-libs-1:5.8-27.el8.aarch64", "product_id": "net-snmp-agent-libs-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-devel-1:5.8-27.el8.aarch64", "product_id": "net-snmp-devel-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-perl-1:5.8-27.el8.aarch64", "product_id": "net-snmp-perl-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-utils-1:5.8-27.el8.aarch64", "product_id": "net-snmp-utils-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-debugsource-1:5.8-27.el8.aarch64", "product_id": "net-snmp-debugsource-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "product_id": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-debuginfo-1:5.8-27.el8.aarch64", "product_id": "net-snmp-debuginfo-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "product_id": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "product_id": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "product_id": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.8-27.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.8-27.el8.aarch64", "product": { "name": "net-snmp-libs-1:5.8-27.el8.aarch64", "product_id": "net-snmp-libs-1:5.8-27.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.8-27.el8?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-devel-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-devel-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-perl-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-perl-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-utils-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-utils-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-debugsource-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-debugsource-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.8-27.el8.ppc64le", "product": { "name": "net-snmp-libs-1:5.8-27.el8.ppc64le", "product_id": "net-snmp-libs-1:5.8-27.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.8-27.el8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-1:5.8-27.el8.x86_64", "product_id": "net-snmp-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-agent-libs-1:5.8-27.el8.x86_64", "product_id": "net-snmp-agent-libs-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-devel-1:5.8-27.el8.x86_64", "product_id": "net-snmp-devel-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-perl-1:5.8-27.el8.x86_64", "product_id": "net-snmp-perl-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-utils-1:5.8-27.el8.x86_64", "product_id": "net-snmp-utils-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-debugsource-1:5.8-27.el8.x86_64", "product_id": "net-snmp-debugsource-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "product_id": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-debuginfo-1:5.8-27.el8.x86_64", "product_id": "net-snmp-debuginfo-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "product_id": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "product_id": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "product_id": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.8-27.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.8-27.el8.x86_64", "product": { "name": "net-snmp-libs-1:5.8-27.el8.x86_64", "product_id": "net-snmp-libs-1:5.8-27.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.8-27.el8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-agent-libs-1:5.8-27.el8.i686", "product": { "name": "net-snmp-agent-libs-1:5.8-27.el8.i686", "product_id": "net-snmp-agent-libs-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.8-27.el8.i686", "product": { "name": "net-snmp-devel-1:5.8-27.el8.i686", "product_id": "net-snmp-devel-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.8-27.el8.i686", "product": { "name": "net-snmp-debugsource-1:5.8-27.el8.i686", "product_id": "net-snmp-debugsource-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "product_id": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.8-27.el8.i686", "product": { "name": "net-snmp-debuginfo-1:5.8-27.el8.i686", "product_id": "net-snmp-debuginfo-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "product": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "product_id": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "product": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "product_id": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "product": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "product_id": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.8-27.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.8-27.el8.i686", "product": { "name": "net-snmp-libs-1:5.8-27.el8.i686", "product_id": "net-snmp-libs-1:5.8-27.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.8-27.el8?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-1:5.8-27.el8.s390x", "product_id": "net-snmp-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-agent-libs-1:5.8-27.el8.s390x", "product_id": "net-snmp-agent-libs-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-devel-1:5.8-27.el8.s390x", "product_id": "net-snmp-devel-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-perl-1:5.8-27.el8.s390x", "product_id": "net-snmp-perl-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-utils-1:5.8-27.el8.s390x", "product_id": "net-snmp-utils-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debugsource-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-debugsource-1:5.8-27.el8.s390x", "product_id": "net-snmp-debugsource-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debugsource@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "product_id": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-agent-libs-debuginfo@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-debuginfo-1:5.8-27.el8.s390x", "product_id": "net-snmp-debuginfo-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "product_id": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs-debuginfo@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "product_id": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl-debuginfo@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "product_id": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils-debuginfo@5.8-27.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.8-27.el8.s390x", "product": { "name": "net-snmp-libs-1:5.8-27.el8.s390x", "product_id": "net-snmp-libs-1:5.8-27.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.8-27.el8?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "net-snmp-1:5.8-27.el8.src", "product": { "name": "net-snmp-1:5.8-27.el8.src", "product_id": "net-snmp-1:5.8-27.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.8-27.el8?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src" }, "product_reference": "net-snmp-1:5.8-27.el8.src", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src" }, "product_reference": "net-snmp-1:5.8-27.el8.src", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-agent-libs-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debugsource-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-debugsource-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-devel-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-libs-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-perl-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-utils-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "relates_to_product_reference": "BaseOS-8.8.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" }, "product_reference": "net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-44792", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-11-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141897" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Net-SNMP. This issue occurs because the handle_ipDefaultTTL function in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP has a NULL Pointer Exception flaw that allows a remote attacker (who has to write access) to cause the instance to crash via a crafted UDP packet, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "net-snmp: NULL Pointer Exception when handling ipDefaultTTL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-44792" }, { "category": "external", "summary": "RHBZ#2141897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141897" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-44792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44792" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-44792", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44792" } ], "release_date": "2022-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-16T08:37:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "net-snmp: NULL Pointer Exception when handling ipDefaultTTL" }, { "cve": "CVE-2022-44793", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-11-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2141898" } ], "notes": [ { "category": "description", "text": "A flaw was found in Net-SNMP. This issue occurs because the handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP has a NULL Pointer Exception that could allow a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "net-snmp: NULL Pointer Exception when handling pv6IpForwarding", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-44793" }, { "category": "external", "summary": "RHBZ#2141898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2141898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-44793", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44793" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-44793", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44793" } ], "release_date": "2022-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-16T08:37:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:2969" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "AppStream-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "AppStream-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.src", "BaseOS-8.8.0.GA:net-snmp-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-agent-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-debugsource-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-devel-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-libs-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-perl-debuginfo-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-1:5.8-27.el8.x86_64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.aarch64", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.i686", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.ppc64le", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.s390x", "BaseOS-8.8.0.GA:net-snmp-utils-debuginfo-1:5.8-27.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "net-snmp: NULL Pointer Exception when handling pv6IpForwarding" } ] }
ICSA-23-320-13
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIMATIC MV500 before V3.3.5 is affected by multiple vulnerabilities.\n\nSiemens has released an update for SIMATIC MV500 and recommends to update to the latest version.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-099606: Multiple Vulnerabilities in SIMATIC MV500 before V3.3.5 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-099606.json" }, { "category": "self", "summary": "SSA-099606: Multiple Vulnerabilities in SIMATIC MV500 before V3.3.5 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-099606.html" }, { "category": "self", "summary": "SSA-099606: Multiple Vulnerabilities in SIMATIC MV500 before V3.3.5 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-099606.pdf" }, { "category": "self", "summary": "SSA-099606: Multiple Vulnerabilities in SIMATIC MV500 before V3.3.5 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-099606.txt" }, { "category": "self", "summary": "ICS Advisory ICSA-23-320-13 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-320-13.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-320-13 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-13" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIMATIC MV500", "tracking": { "current_release_date": "2023-11-14T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-320-13", "initial_release_date": "2023-11-14T00:00:00.000000Z", "revision_history": [ { "date": "2023-11-14T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3.5", "product": { "name": "SIMATIC MV500 family", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SIMATIC MV500 family" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23218", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.3.5 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109825816/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-23218" }, { "cve": "CVE-2022-23219", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.3.5 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109825816/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-23219" }, { "cve": "CVE-2022-44792", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.3.5 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109825816/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-44792" }, { "cve": "CVE-2022-44793", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.3.5 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109825816/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-44793" }, { "cve": "CVE-2023-2975", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "Issue summary: The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries which are unauthenticated as a consequence. Impact summary: Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associated data can be mislead by removing adding or reordering such empty entries as these are ignored by the OpenSSL implementation. We are currently unaware of any such applications. The AES-SIV algorithm allows for authentication of multiple associated data entries along with the encryption. To authenticate empty data the application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with NULL pointer as the output buffer and 0 as the input buffer length. The AES-SIV implementation in OpenSSL just returns success for such a call instead of performing the associated data authentication operation. The empty data thus will not be authenticated. As this issue does not affect non-empty associated data authentication and we expect it to be rare for an application to use empty associated data entries this is qualified as Low severity issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.3.5 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109825816/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2023-2975" }, { "cve": "CVE-2023-3446", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "summary", "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (\u0027p\u0027 parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \u0027-check\u0027 option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.3.5 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109825816/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2023-3446" }, { "cve": "CVE-2023-3817", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "summary", "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \"-check\" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.3.5 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109825816/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2023-3817" }, { "cve": "CVE-2023-35788", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.3.5 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109825816/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2023-35788" } ] }
icsa-23-320-13
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIMATIC MV500 before V3.3.5 is affected by multiple vulnerabilities.\n\nSiemens has released an update for SIMATIC MV500 and recommends to update to the latest version.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-099606: Multiple Vulnerabilities in SIMATIC MV500 before V3.3.5 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-099606.json" }, { "category": "self", "summary": "SSA-099606: Multiple Vulnerabilities in SIMATIC MV500 before V3.3.5 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-099606.html" }, { "category": "self", "summary": "SSA-099606: Multiple Vulnerabilities in SIMATIC MV500 before V3.3.5 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-099606.pdf" }, { "category": "self", "summary": "SSA-099606: Multiple Vulnerabilities in SIMATIC MV500 before V3.3.5 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-099606.txt" }, { "category": "self", "summary": "ICS Advisory ICSA-23-320-13 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-320-13.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-320-13 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-13" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIMATIC MV500", "tracking": { "current_release_date": "2023-11-14T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-320-13", "initial_release_date": "2023-11-14T00:00:00.000000Z", "revision_history": [ { "date": "2023-11-14T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV3.3.5", "product": { "name": "SIMATIC MV500 family", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SIMATIC MV500 family" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23218", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.3.5 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109825816/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-23218" }, { "cve": "CVE-2022-23219", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.3.5 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109825816/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-23219" }, { "cve": "CVE-2022-44792", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.3.5 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109825816/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-44792" }, { "cve": "CVE-2022-44793", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.3.5 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109825816/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-44793" }, { "cve": "CVE-2023-2975", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "Issue summary: The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries which are unauthenticated as a consequence. Impact summary: Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associated data can be mislead by removing adding or reordering such empty entries as these are ignored by the OpenSSL implementation. We are currently unaware of any such applications. The AES-SIV algorithm allows for authentication of multiple associated data entries along with the encryption. To authenticate empty data the application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with NULL pointer as the output buffer and 0 as the input buffer length. The AES-SIV implementation in OpenSSL just returns success for such a call instead of performing the associated data authentication operation. The empty data thus will not be authenticated. As this issue does not affect non-empty associated data authentication and we expect it to be rare for an application to use empty associated data entries this is qualified as Low severity issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.3.5 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109825816/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2023-2975" }, { "cve": "CVE-2023-3446", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "summary", "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (\u0027p\u0027 parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \u0027-check\u0027 option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.3.5 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109825816/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2023-3446" }, { "cve": "CVE-2023-3817", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "summary", "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \"-check\" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.3.5 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109825816/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2023-3817" }, { "cve": "CVE-2023-35788", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V3.3.5 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109825816/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2023-35788" } ] }
ICSA-24-165-10
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 are affected by multiple vulnerabilities in third-party components and the integrated web server.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-625862.json" }, { "category": "self", "summary": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-625862.html" }, { "category": "self", "summary": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-625862.pdf" }, { "category": "self", "summary": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-625862.txt" }, { "category": "self", "summary": "ICS Advisory ICSA-24-165-10 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-165-10.json" }, { "category": "self", "summary": "ICS Advisory ICSA-24-165-10 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-10" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIMATIC and SIPLUS", "tracking": { "current_release_date": "2024-06-11T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-24-165-10", "initial_release_date": "2024-06-11T00:00:00.000000Z", "revision_history": [ { "date": "2024-06-11T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6GK7542-6UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0)", "product_id": "CSAFPID-0002", "product_identification_helper": { "model_numbers": [ "6GK7542-6VX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)", "product_id": "CSAFPID-0003", "product_identification_helper": { "model_numbers": [ "6GK7543-6WX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0)", "product_id": "CSAFPID-0004", "product_identification_helper": { "model_numbers": [ "6AG2542-6VX00-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)", "product_id": "CSAFPID-0005", "product_identification_helper": { "model_numbers": [ "6AG1543-6WX00-7XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)", "product_id": "CSAFPID-0006", "product_identification_helper": { "model_numbers": [ "6AG2543-6WX00-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2097", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn\u0027t written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-2097" }, { "cve": "CVE-2022-3435", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-3435" }, { "cve": "CVE-2022-3545", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3623", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211921 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-3623" }, { "cve": "CVE-2022-3643", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-3643" }, { "cve": "CVE-2022-4304", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-4304" }, { "cve": "CVE-2022-4450", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-4450" }, { "cve": "CVE-2022-40303", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-40304" }, { "cve": "CVE-2022-42328", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "Guests can trigger deadlock in Linux netback driver [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "Guests can trigger deadlock in Linux netback drive. The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-42329" }, { "cve": "CVE-2022-44792", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-44792" }, { "cve": "CVE-2022-44793", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-44793" }, { "cve": "CVE-2023-0215", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0464", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing the `-policy` argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Applications that use a non-default option when verifying certificates may be\r\nvulnerable to an attack from a malicious CA to circumvent certain checks.\r\n\r\nInvalid certificate policies in leaf certificates are silently ignored by\r\nOpenSSL and other certificate policy checks are skipped for that certificate.\r\nA malicious CA could use this to deliberately assert invalid certificate policies\r\nin order to circumvent policy checking on the certificate altogether.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing\r\nthe `-policy` argument to the command line utilities or by calling the\r\n`X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The function X509_VERIFY_PARAM_add0_policy() is documented to\nimplicitly enable the certificate policy check when doing certificate\nverification. However the implementation of the function does not\nenable the check which allows certificates with invalid or incorrect\npolicies to pass the certificate verification.\n\nAs suddenly enabling the policy check could break existing deployments it was\ndecided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()\nfunction.\n\nInstead the applications that require OpenSSL to perform certificate\npolicy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly\nenable the policy check by calling X509_VERIFY_PARAM_set_flags() with\nthe X509_V_FLAG_POLICY_CHECK flag argument.\n\nCertificate policy checks are disabled by default in OpenSSL and are not\ncommonly used by applications.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-0466" }, { "cve": "CVE-2023-28484", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-28484" }, { "cve": "CVE-2023-29469", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the \u0027\\0\u0027 value).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-29469" }, { "cve": "CVE-2023-38380", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "The webserver implementation of the affected products does not correctly release allocated memory after it has been used.\r\n\r\nAn attacker with network access could use this vulnerability to cause a denial-of-service condition in the webserver of the affected product.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-38380" }, { "cve": "CVE-2023-41910", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An issue was discovered in lldpd before 1.0.17. By crafting a CDP PDU packet with specific CDP_TLV_ADDRESSES TLVs, a malicious actor can remotely force the lldpd daemon to perform an out-of-bounds read on heap memory. This occurs in cdp_decode in daemon/protocols/cdp.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-41910" }, { "cve": "CVE-2023-50763", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The web server of affected products, if configured to allow the import of PKCS12 containers, could end up in an infinite loop when processing incomplete certificate chains.\r\n\r\nThis could allow an authenticated remote attacker to create a denial of service condition by importing specially crafted PKCS12 containers.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-50763" } ] }
icsa-24-165-10
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 are affected by multiple vulnerabilities in third-party components and the integrated web server.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-625862.json" }, { "category": "self", "summary": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-625862.html" }, { "category": "self", "summary": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-625862.pdf" }, { "category": "self", "summary": "SSA-625862: Multiple Vulnerabilities in Third-Party Components in SIMATIC CP 1542SP-1 and CP 1543SP-1 before V2.3 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-625862.txt" }, { "category": "self", "summary": "ICS Advisory ICSA-24-165-10 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-165-10.json" }, { "category": "self", "summary": "ICS Advisory ICSA-24-165-10 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-10" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIMATIC and SIPLUS", "tracking": { "current_release_date": "2024-06-11T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-24-165-10", "initial_release_date": "2024-06-11T00:00:00.000000Z", "revision_history": [ { "date": "2024-06-11T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6GK7542-6UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0)", "product_id": "CSAFPID-0002", "product_identification_helper": { "model_numbers": [ "6GK7542-6VX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)", "product_id": "CSAFPID-0003", "product_identification_helper": { "model_numbers": [ "6GK7543-6WX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0)", "product_id": "CSAFPID-0004", "product_identification_helper": { "model_numbers": [ "6AG2542-6VX00-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)", "product_id": "CSAFPID-0005", "product_identification_helper": { "model_numbers": [ "6AG1543-6WX00-7XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.3", "product": { "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)", "product_id": "CSAFPID-0006", "product_identification_helper": { "model_numbers": [ "6AG2543-6WX00-4XE0" ] } } } ], "category": "product_name", "name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2097", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn\u0027t written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-2097" }, { "cve": "CVE-2022-3435", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-3435" }, { "cve": "CVE-2022-3545", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3623", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211921 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-3623" }, { "cve": "CVE-2022-3643", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-3643" }, { "cve": "CVE-2022-4304", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-4304" }, { "cve": "CVE-2022-4450", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-4450" }, { "cve": "CVE-2022-40303", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-40304" }, { "cve": "CVE-2022-42328", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "Guests can trigger deadlock in Linux netback driver [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "Guests can trigger deadlock in Linux netback drive. The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-42329" }, { "cve": "CVE-2022-44792", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-44792" }, { "cve": "CVE-2022-44793", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2022-44793" }, { "cve": "CVE-2023-0215", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0464", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing the `-policy` argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Applications that use a non-default option when verifying certificates may be\r\nvulnerable to an attack from a malicious CA to circumvent certain checks.\r\n\r\nInvalid certificate policies in leaf certificates are silently ignored by\r\nOpenSSL and other certificate policy checks are skipped for that certificate.\r\nA malicious CA could use this to deliberately assert invalid certificate policies\r\nin order to circumvent policy checking on the certificate altogether.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing\r\nthe `-policy` argument to the command line utilities or by calling the\r\n`X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The function X509_VERIFY_PARAM_add0_policy() is documented to\nimplicitly enable the certificate policy check when doing certificate\nverification. However the implementation of the function does not\nenable the check which allows certificates with invalid or incorrect\npolicies to pass the certificate verification.\n\nAs suddenly enabling the policy check could break existing deployments it was\ndecided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()\nfunction.\n\nInstead the applications that require OpenSSL to perform certificate\npolicy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly\nenable the policy check by calling X509_VERIFY_PARAM_set_flags() with\nthe X509_V_FLAG_POLICY_CHECK flag argument.\n\nCertificate policy checks are disabled by default in OpenSSL and are not\ncommonly used by applications.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-0466" }, { "cve": "CVE-2023-28484", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-28484" }, { "cve": "CVE-2023-29469", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the \u0027\\0\u0027 value).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-29469" }, { "cve": "CVE-2023-38380", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "The webserver implementation of the affected products does not correctly release allocated memory after it has been used.\r\n\r\nAn attacker with network access could use this vulnerability to cause a denial-of-service condition in the webserver of the affected product.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-38380" }, { "cve": "CVE-2023-41910", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An issue was discovered in lldpd before 1.0.17. By crafting a CDP PDU packet with specific CDP_TLV_ADDRESSES TLVs, a malicious actor can remotely force the lldpd daemon to perform an out-of-bounds read on heap memory. This occurs in cdp_decode in daemon/protocols/cdp.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-41910" }, { "cve": "CVE-2023-50763", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The web server of affected products, if configured to allow the import of PKCS12 containers, could end up in an infinite loop when processing incomplete certificate chains.\r\n\r\nThis could allow an authenticated remote attacker to create a denial of service condition by importing specially crafted PKCS12 containers.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.3 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109954475/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2023-50763" } ] }
CERTFR-2023-AVI-0935
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Siemens | N/A | RUGGEDCOM RSG920P V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE XC208G (6GK5208-0GA00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0) toutes les versions | ||
Siemens | N/A | SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0) toutes les versions | ||
Siemens | N/A | Applications Mendix basées sur Mendix 10 versions antérieures à V10.4.0 | ||
Siemens | N/A | RUGGEDCOM RS416PNC toutes les versions | ||
Siemens | N/A | SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2) versions antérieures à V4.5 | ||
Siemens | N/A | SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2200NC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS8000NC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2300PF toutes les versions | ||
Siemens | N/A | SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS416Pv2 V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RST2228P versions antérieures à V5.6.0 | ||
Siemens | N/A | SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XC208EEC (6GK5208-0BA00-2FC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2300P V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RS969 versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS940GNC toutes les versions | ||
Siemens | N/A | SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0) toutes les versions | ||
Siemens | N/A | Mendix Studio Pro 8 versions antérieures à V8.18.27 | ||
Siemens | N/A | RUGGEDCOM RS900GNC toutes les versions | ||
Siemens | N/A | RUGGEDCOM M2200F toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2200F toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS900LNC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS416PNCv2 V5.X toutes les versions | ||
Siemens | N/A | SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2) versions antérieures à V4.5 | ||
Siemens | N/A | Siemens OPC UA Modelling Editor (SiOME) versions antérieures à V2.8 | ||
Siemens | N/A | SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2488NC V5.X toutes les versions | ||
Siemens | N/A | SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS1600TNC toutes les versions | ||
Siemens | N/A | SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM M2100 versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XC208 (6GK5208-0BA00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2288NC V4.X toutes les versions | ||
Siemens | N/A | SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0) toutes les versions | ||
Siemens | N/A | SCALANCE XP216EEC (6GK5216-0HA00-2ES6) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XC216-4C G (6GK5216-4GS00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS900M-GETS-XX versions antérieures à V4.3.8 | ||
Siemens | N/A | Mendix Studio Pro 10 versions antérieures à V10.3.1 | ||
Siemens | N/A | SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XP208EEC (6GK5208-0HA00-2ES6) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS900MNC-GETS-C01 toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS900NC(32M) V4.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM M2200 versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XP216 (6GK5216-0HA00-2AS6) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM i801NC toutes les versions | ||
Siemens | N/A | SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RST916C versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM i800 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RSG2300NC V4.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS910LNC toutes les versions | ||
Siemens | N/A | Tecnomatix Plant Simulation V2302 versions antérieures à V2302.0004 | ||
Siemens | N/A | RUGGEDCOM RS900GP versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS400 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS900M-STND-C01 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS940GF toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS416F toutes les versions | ||
Siemens | N/A | SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) toutes les versions | ||
Siemens | N/A | SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2100 (32M) V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RSG2300 V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS900 (32M) V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS900G versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RMC8388NC V5.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RMC8388NC V4.X toutes les versions | ||
Siemens | N/A | SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS900GF toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2288 V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | SINEC PNI versions antérieures à V2.0 | ||
Siemens | N/A | SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2488NC V4.X toutes les versions | ||
Siemens | N/A | Desigo CC product family V7 toutes les versions sans le dernier correctif de sécurité | ||
Siemens | N/A | SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS8000TNC toutes les versions | ||
Siemens | N/A | SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0) toutes les versions | ||
Siemens | N/A | SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS400NC toutes les versions | ||
Siemens | N/A | SCALANCE XF204 DNA (6GK5204-0BA00-2YF2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM i803NC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS910W versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XC216-4C (6GK5216-4BS00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XC224-4C G (6GK5224-4GS00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS416NCv2 V4.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2100F toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2100PF toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS1600T versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XC208G EEC (6GK5208-0GA00-2FC2) versions antérieures à V4.5 | ||
Siemens | N/A | Desigo CC product family V5.0 toutes les versions sans le dernier correctif de sécurité | ||
Siemens | N/A | SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2300PNC V4.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2300P V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RMC30 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS920W versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS416PF toutes les versions | ||
Siemens | N/A | RUGGEDCOM i803 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM APE1808 toutes versions utilisées avec Nozomi Guardian / CMC versions V22.6.3 à 23.1.0sans le dernier correctif de sécurité | ||
Siemens | N/A | Applications Mendix basées sur Mendix 7.x versions antérieures à V7.23.37 | ||
Siemens | N/A | RUGGEDCOM RSG908C versions antérieures à V5.6.0 | ||
Siemens | N/A | Applications Mendix basées sur Mendix 9.x versions antérieures à V9.24.10 | ||
Siemens | N/A | RUGGEDCOM RSG920P V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RS900W versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XF204-2BA (6GK5204-2AA00-2GF2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS401NC toutes les versions | ||
Siemens | N/A | SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) toutes les versions | ||
Siemens | N/A | SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0) toutes les versions | ||
Siemens | N/A | Desigo CC product family V5.1 toutes les versions sans le dernier correctif de sécurité | ||
Siemens | N/A | SCALANCE XC224 (6GK5224-0BA00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS900MNC-STND-XX toutes les versions | ||
Siemens | N/A | SIMATIC MV500 family versions antérieures à V3.3.5 | ||
Siemens | N/A | RUGGEDCOM RST916P versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RS401 versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2488 V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS910 versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS416v2 V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RSG2488F toutes les versions | ||
Siemens | N/A | SCALANCE XC216EEC (6GK5216-0BA00-2FC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS900GNC(32M) V4.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RST2228 versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RS416P versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RSG2288NC V5.X toutes les versions | ||
Siemens | N/A | SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM M2100F toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS8000 versions antérieures à V4.3.8 | ||
Siemens | N/A | Applications Mendix basées sur Mendix 8.x versions antérieures à V8.18.27 | ||
Siemens | N/A | SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0) toutes les versions | ||
Siemens | N/A | SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS900NC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RP110NC toutes les versions | ||
Siemens | N/A | SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2100P versions antérieures à V4.3.8 | ||
Siemens | N/A | SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM M969F toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS900GPF toutes les versions | ||
Siemens | N/A | SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG907R versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM i802 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM M969 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RSG920PNC V5.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS920L versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS900MNC-STND-XX-C01 toutes les versions | ||
Siemens | N/A | SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS900F toutes les versions | ||
Siemens | N/A | SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS900G (32M) V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0) toutes les versions | ||
Siemens | N/A | SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0) toutes les versions | ||
Siemens | N/A | Simcenter Femap V2301 versions antérieures à V2301.0003 | ||
Siemens | N/A | RUGGEDCOM RSG2100NC(32M) V4.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2288 V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RSG920PNC V4.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS8000H versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RMC8388 V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RSG910C versions antérieures à V5.6.0 | ||
Siemens | N/A | SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG909R versions antérieures à V5.6.0 | ||
Siemens | N/A | SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS416PNCv2 V4.X toutes les versions | ||
Siemens | N/A | SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS910NC toutes les versions | ||
Siemens | N/A | SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6) toutes les versions | ||
Siemens | N/A | SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) toutes les versions | ||
Siemens | N/A | SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2) versions antérieures à V4.5 | ||
Siemens | N/A | Desigo CC product family V6 toutes les versions sans le dernier correctif de sécurité | ||
Siemens | N/A | RUGGEDCOM RS416Pv2 V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6) toutes les versions | ||
Siemens | N/A | RUGGEDCOM i800NC toutes les versions | ||
Siemens | N/A | SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS930LNC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RMC8388 V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | SIMATIC PCS neo versions antérieures à V4.1 | ||
Siemens | N/A | RUGGEDCOM RS900M-STND-XX versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS910L versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6) toutes les versions | ||
Siemens | N/A | RUGGEDCOM i802NC toutes les versions | ||
Siemens | N/A | SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS1600FNC toutes les versions | ||
Siemens | N/A | SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2100PNC toutes les versions | ||
Siemens | N/A | SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS400F toutes les versions | ||
Siemens | N/A | Mendix Studio Pro 7 versions antérieures à V7.23.37 | ||
Siemens | N/A | RUGGEDCOM RSG2100 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS8000A versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS900L versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS920LNC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS8000T versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0) toutes les versions | ||
Siemens | N/A | SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RMC30NC toutes les versions | ||
Siemens | N/A | COMOS versions antérieures à V10.4.4, les vulnérabilités CVE-2023-43505, CVE-2023-46601 ne seront pas corrigées par l'éditeur | ||
Siemens | N/A | RUGGEDCOM RS900GNC(32M) V5.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2488 V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RS8000ANC toutes les versions | ||
Siemens | N/A | SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE XC216 (6GK5216-0BA00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS930L versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0) toutes les versions | ||
Siemens | N/A | SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) toutes les versions | ||
Siemens | N/A | SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSL910NC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2300 V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RSG2300PNC V5.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM i801 versions antérieures à V4.3.8 | ||
Siemens | N/A | Mendix Studio Pro 9 versions antérieures à V9.24.0 | ||
Siemens | N/A | RUGGEDCOM M2100NC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS416NCv2 V5.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2100NC toutes les versions | ||
Siemens | N/A | SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS900M-GETS-C01 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS969NC toutes les versions | ||
Siemens | N/A | SCALANCE XP208 (6GK5208-0HA00-2AS6) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XC208G PoE (6GK5208-0RA00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS900G (32M) V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | Tecnomatix Plant Simulation V2201 versions antérieures à V2201.0010 | ||
Siemens | N/A | SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS900 versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS8000HNC toutes les versions | ||
Siemens | N/A | SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2) versions antérieures à V4.5 | ||
Siemens | N/A | Simcenter Femap V2306 versions antérieures à V2306.0001 | ||
Siemens | N/A | RUGGEDCOM RP110 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS900 (32M) V4.X versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RSG2100 (32M) V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM M969NC toutes les versions | ||
Siemens | N/A | SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2) versions antérieures à V4.5 | ||
Siemens | N/A | SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSL910 versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RS1600F versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS900NC(32M) V5.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS416 versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) toutes les versions | ||
Siemens | N/A | SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0) toutes les versions | ||
Siemens | N/A | SCALANCE XF204 (6GK5204-0BA00-2GF2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2300NC V5.X toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS900MNC-GETS-XX toutes les versions | ||
Siemens | N/A | SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS930W versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM M2200NC toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS416v2 V5.X versions antérieures à V5.6.0 | ||
Siemens | N/A | RUGGEDCOM RS900GPNC toutes les versions | ||
Siemens | N/A | SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0) toutes les versions | ||
Siemens | N/A | SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS1600 versions antérieures à V4.3.8 | ||
Siemens | N/A | RUGGEDCOM RS940G versions antérieures à V4.3.8 | ||
Siemens | N/A | SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0) toutes les versions | ||
Siemens | N/A | SIPROTEC 4 7SJ66 versions antérieures à V4.41 | ||
Siemens | N/A | RUGGEDCOM RSG2300F toutes les versions | ||
Siemens | N/A | SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0) toutes les versions | ||
Siemens | N/A | SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RS1600NC toutes les versions | ||
Siemens | N/A | SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2) versions antérieures à V4.5 | ||
Siemens | N/A | RUGGEDCOM RSG2100NC(32M) V5.X toutes les versions | ||
Siemens | N/A | SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) toutes les versions | ||
Siemens | N/A | SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RS416NC toutes les versions | ||
Siemens | N/A | SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0) toutes les versions | ||
Siemens | N/A | RUGGEDCOM RSG2200 versions antérieures à V4.3.8 |
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "RUGGEDCOM RSG920P V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC208G (6GK5208-0GA00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Applications Mendix bas\u00e9es sur Mendix 10 versions ant\u00e9rieures \u00e0 V10.4.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416PNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2200NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS8000NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300PF toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416Pv2 V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RST2228P versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300P V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS969 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS940GNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Mendix Studio Pro 8 versions ant\u00e9rieures \u00e0 V8.18.27", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900GNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M2200F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2200F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900LNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416PNCv2 V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siemens OPC UA Modelling Editor (SiOME) versions ant\u00e9rieures \u00e0 V2.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2488NC V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS1600TNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M2100 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC208 (6GK5208-0BA00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2288NC V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900M-GETS-XX versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Mendix Studio Pro 10 versions ant\u00e9rieures \u00e0 V10.3.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900MNC-GETS-C01 toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900NC(32M) V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M2200 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XP216 (6GK5216-0HA00-2AS6) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM i801NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RST916C versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM i800 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300NC V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS910LNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Tecnomatix Plant Simulation V2302 versions ant\u00e9rieures \u00e0 V2302.0004", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900GP versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS400 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900M-STND-C01 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS940GF toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100 (32M) V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300 V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900 (32M) V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900G versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RMC8388NC V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RMC8388NC V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900GF toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2288 V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SINEC PNI versions ant\u00e9rieures \u00e0 V2.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2488NC V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Desigo CC product family V7 toutes les versions sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS8000TNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS400NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM i803NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS910W versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416NCv2 V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100PF toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS1600T versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Desigo CC product family V5.0 toutes les versions sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300PNC V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300P V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RMC30 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS920W versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416PF toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM i803 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM APE1808 toutes versions utilis\u00e9es avec Nozomi Guardian / CMC versions V22.6.3 \u00e0 23.1.0sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Applications Mendix bas\u00e9es sur Mendix 7.x versions ant\u00e9rieures \u00e0 V7.23.37", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG908C versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Applications Mendix bas\u00e9es sur Mendix 9.x versions ant\u00e9rieures \u00e0 V9.24.10", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG920P V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900W versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS401NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Desigo CC product family V5.1 toutes les versions sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC224 (6GK5224-0BA00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900MNC-STND-XX toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC MV500 family versions ant\u00e9rieures \u00e0 V3.3.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RST916P versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS401 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2488 V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS910 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416v2 V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2488F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900GNC(32M) V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RST2228 versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416P versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2288NC V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M2100F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS8000 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Applications Mendix bas\u00e9es sur Mendix 8.x versions ant\u00e9rieures \u00e0 V8.18.27", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RP110NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100P versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M969F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900GPF toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG907R versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM i802 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M969 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG920PNC V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS920L versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900MNC-STND-XX-C01 toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900G (32M) V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Simcenter Femap V2301 versions ant\u00e9rieures \u00e0 V2301.0003", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100NC(32M) V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2288 V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG920PNC V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS8000H versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RMC8388 V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG910C versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG909R versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416PNCv2 V4.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS910NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Desigo CC product family V6 toutes les versions sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416Pv2 V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM i800NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS930LNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RMC8388 V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC PCS neo versions ant\u00e9rieures \u00e0 V4.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900M-STND-XX versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS910L versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM i802NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS1600FNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100PNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS400F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Mendix Studio Pro 7 versions ant\u00e9rieures \u00e0 V7.23.37", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS8000A versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900L versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS920LNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS8000T versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RMC30NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "COMOS versions ant\u00e9rieures \u00e0 V10.4.4, les vuln\u00e9rabilit\u00e9s CVE-2023-43505, CVE-2023-46601 ne seront pas corrig\u00e9es par l\u0027\u00e9diteur", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900GNC(32M) V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2488 V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS8000ANC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC216 (6GK5216-0BA00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS930L versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSL910NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300 V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300PNC V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM i801 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Mendix Studio Pro 9 versions ant\u00e9rieures \u00e0 V9.24.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M2100NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416NCv2 V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900M-GETS-C01 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS969NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XP208 (6GK5208-0HA00-2AS6) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900G (32M) V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Tecnomatix Plant Simulation V2201 versions ant\u00e9rieures \u00e0 V2201.0010", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS8000HNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Simcenter Femap V2306 versions ant\u00e9rieures \u00e0 V2306.0001", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RP110 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900 (32M) V4.X versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100 (32M) V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M969NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSL910 versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS1600F versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900NC(32M) V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XF204 (6GK5204-0BA00-2GF2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300NC V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900MNC-GETS-XX toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS930W versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM M2200NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416v2 V5.X versions ant\u00e9rieures \u00e0 V5.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS900GPNC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS1600 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS940G versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIPROTEC 4 7SJ66 versions ant\u00e9rieures \u00e0 V4.41", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2300F toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS1600NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2) versions ant\u00e9rieures \u00e0 V4.5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2100NC(32M) V5.X toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RS416NC toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0) toutes les versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "RUGGEDCOM RSG2200 versions ant\u00e9rieures \u00e0 V4.3.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-24895", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24895" }, { "name": "CVE-2023-0216", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216" }, { "name": "CVE-2020-35460", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35460" }, { "name": "CVE-2023-0401", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401" }, { "name": "CVE-2023-33135", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33135" }, { "name": "CVE-2023-1530", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1530" }, { "name": "CVE-2023-22669", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22669" }, { "name": "CVE-2023-44321", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44321" }, { "name": "CVE-2023-3935", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3935" }, { "name": "CVE-2023-46096", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46096" }, { "name": "CVE-2023-44317", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44317" }, { "name": "CVE-2022-4304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304" }, { "name": "CVE-2023-38072", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38072" }, { "name": "CVE-2023-24897", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24897" }, { "name": "CVE-2022-44792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44792" }, { "name": "CVE-2023-3817", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817" }, { "name": "CVE-2023-38075", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38075" }, { "name": "CVE-2019-12256", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12256" }, { "name": "CVE-2023-35788", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35788" }, { "name": "CVE-2022-28809", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28809" }, { "name": "CVE-2023-24936", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24936" }, { "name": "CVE-2023-38073", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38073" }, { "name": "CVE-2023-46097", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46097" }, { "name": "CVE-2019-12258", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12258" }, { "name": "CVE-2020-25020", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25020" }, { "name": "CVE-2022-4203", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4203" }, { "name": "CVE-2022-44793", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44793" }, { "name": "CVE-2023-33128", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33128" }, { "name": "CVE-2019-12259", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12259" }, { "name": "CVE-2023-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217" }, { "name": "CVE-2023-44320", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44320" }, { "name": "CVE-2022-39158", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39158" }, { "name": "CVE-2022-28808", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28808" }, { "name": "CVE-2019-12261", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12261" }, { "name": "CVE-2023-46099", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46099" }, { "name": "CVE-2023-46590", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46590" }, { "name": "CVE-2023-2932", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2932" }, { "name": "CVE-2023-41033", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41033" }, { "name": "CVE-2023-46098", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46098" }, { "name": "CVE-2022-37434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434" }, { "name": "CVE-2021-20094", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20094" }, { "name": "CVE-2022-28807", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28807" }, { "name": "CVE-2023-38071", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38071" }, { "name": "CVE-2023-45794", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45794" }, { "name": "CVE-2019-12263", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12263" }, { "name": "CVE-2021-20093", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20093" }, { "name": "CVE-2023-44319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44319" }, { "name": "CVE-2023-46601", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46601" }, { "name": "CVE-2023-32032", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32032" }, { "name": "CVE-2022-4450", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450" }, { "name": "CVE-2023-2650", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650" }, { "name": "CVE-2022-47522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-47522" }, { "name": "CVE-2023-38070", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38070" }, { "name": "CVE-2022-23095", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23095" }, { "name": "CVE-2023-44322", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44322" }, { "name": "CVE-2023-29245", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29245" }, { "name": "CVE-2023-43503", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43503" }, { "name": "CVE-2019-12260", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12260" }, { "name": "CVE-2022-23218", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23218" }, { "name": "CVE-2023-28260", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28260" }, { "name": "CVE-2023-43505", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43505" }, { "name": "CVE-2023-38074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38074" }, { "name": "CVE-2019-12262", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12262" }, { "name": "CVE-2023-29331", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29331" }, { "name": "CVE-2019-12255", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12255" }, { "name": "CVE-2023-44374", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44374" }, { "name": "CVE-2023-43504", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43504" }, { "name": "CVE-2023-0933", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0933" }, { "name": "CVE-2023-2567", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2567" }, { "name": "CVE-2023-32649", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32649" }, { "name": "CVE-2022-41032", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41032" }, { "name": "CVE-2023-4863", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4863" }, { "name": "CVE-2023-21808", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21808" }, { "name": "CVE-2023-2931", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2931" }, { "name": "CVE-2023-2975", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2975" }, { "name": "CVE-2022-30184", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30184" }, { "name": "CVE-2019-12265", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12265" }, { "name": "CVE-2023-44373", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44373" }, { "name": "CVE-2023-3446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446" }, { "name": "CVE-2022-23219", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23219" }, { "name": "CVE-2023-38076", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38076" }, { "name": "CVE-2023-41032", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41032" }, { "name": "CVE-2023-33126", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33126" }, { "name": "CVE-2023-44318", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44318" }, { "name": "CVE-2023-22670", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22670" } ], "initial_release_date": "2023-11-14T00:00:00", "last_revision_date": "2023-11-14T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0935", "revisions": [ { "description": "Version initiale", "revision_date": "2023-11-14T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un\nd\u00e9ni de service \u00e0 distance et une ex\u00e9cution de code arbitraire \u00e0\ndistance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-617233 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-292063.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-268517 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-084182.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-197270 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-787941.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-099606 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-625850.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-137900 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-137900.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-456933 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-456933.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-787941 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-457702.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-084182 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-887122.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-887122 du 08 novembre 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-150063.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-150063 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-268517.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-699386 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-197270.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-292063 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-617233.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-625850 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-457702 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-099606.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-478780 du 14 novembre 2023", "url": "https://cert-portal.siemens.com/productcert/html/ssa-478780.html" } ] }
CERTFR-2024-AVI-0478
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Siemens | N/A | SINEC Traffic Analyzer versions antérieures à 1.2 | ||
Siemens | N/A | SIPLUS ET 200SP CP 1543SP-1 ISEC versions antérieures à 2.3 | ||
Siemens | N/A | SITOP UPS1600 EX 20 A Ethernet PROFINET versions antérieures à 2.5.4 | ||
Siemens | N/A | Teamcenter Visualization 14.3 versions antérieures à 14.3.0.9 | ||
Siemens | N/A | SITOP UPS1600 40 A Ethernet/ PROFINET versions antérieures à 2.5.4 | ||
Siemens | N/A | PCCX26 Ax 1703 PE, Contr, Communication Element versions antérieures à 06.05 | ||
Siemens | N/A | Tecnomatix Plant Simulation 2404 versions antérieures à 2404.0001 | ||
Siemens | N/A | TIM 1531 IRC versions antérieures à 2.4.8 | ||
Siemens | N/A | CPCX26 Central Processing/Communication versions antérieures à 06.02 | ||
Siemens | N/A | SITOP UPS1600 20 A Ethernet/ PROFINET versions antérieures à 2.5.4 | ||
Siemens | N/A | Teamcenter Visualization 2312 versions antérieures à 2312.0004 | ||
Siemens | N/A | JT2Go versions antérieures à 2312.0004 | ||
Siemens | N/A | les applications Mendix utilisant Mendix 10 versions antérieures à 10.11.0 | ||
Siemens | N/A | Tecnomatix Plant Simulation 2302 versions antérieures à 2302.0012 | ||
Siemens | N/A | SIPLUS TIM 1531 IRC versions antérieures à 2.4.8 | ||
Siemens | N/A | ETA5 Ethernet Int. 1x100TX IEC61850 Ed.2 versions antérieures à 03.27 | ||
Siemens | N/A | SITOP UPS1600 10 A Ethernet/ PROFINET versions antérieures à 2.5.4 | ||
Siemens | N/A | PowerSys versions antérieures à 3.11 | ||
Siemens | N/A | ETA4 Ethernet Interface IEC60870-5-104 versions antérieures à 10.46 | ||
Siemens | N/A | TIA Administrator versions antérieures à 3 SP2 | ||
Siemens | N/A | les applications Mendix utilisant Mendix 9 versions antérieures à 9.24.22 | ||
Siemens | N/A | ST7 ScadaConnect versions antérieures à 1.1 | ||
Siemens | N/A | SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL versions antérieures à 2.3 | ||
Siemens | N/A | Teamcenter Visualization 14.2 toutes versions, aucun correctif n'est disponible | ||
Siemens | N/A | les produits SCALANCE, se référer au bulletin de sécurité de l'éditeur (cf. section Documentation) | ||
Siemens | N/A | SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL versions antérieures à 2.3 | ||
Siemens | N/A | les applications Mendix utilisant Mendix 10.6 versions antérieures à 10.6.9 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SINEC Traffic Analyzer versions ant\u00e9rieures \u00e0 1.2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIPLUS ET 200SP CP 1543SP-1 ISEC versions ant\u00e9rieures \u00e0 2.3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SITOP UPS1600 EX 20 A Ethernet PROFINET versions ant\u00e9rieures \u00e0 2.5.4", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Teamcenter Visualization 14.3 versions ant\u00e9rieures \u00e0 14.3.0.9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SITOP UPS1600 40 A Ethernet/ PROFINET versions ant\u00e9rieures \u00e0 2.5.4", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "PCCX26 Ax 1703 PE, Contr, Communication Element versions ant\u00e9rieures \u00e0 06.05", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Tecnomatix Plant Simulation 2404 versions ant\u00e9rieures \u00e0 2404.0001", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "TIM 1531 IRC versions ant\u00e9rieures \u00e0 2.4.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "CPCX26 Central Processing/Communication versions ant\u00e9rieures \u00e0 06.02", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SITOP UPS1600 20 A Ethernet/ PROFINET versions ant\u00e9rieures \u00e0 2.5.4", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Teamcenter Visualization 2312 versions ant\u00e9rieures \u00e0 2312.0004", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "JT2Go versions ant\u00e9rieures \u00e0 2312.0004", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "les applications Mendix utilisant Mendix 10 versions ant\u00e9rieures \u00e0 10.11.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Tecnomatix Plant Simulation 2302 versions ant\u00e9rieures \u00e0 2302.0012", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIPLUS TIM 1531 IRC versions ant\u00e9rieures \u00e0 2.4.8", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "ETA5 Ethernet Int. 1x100TX IEC61850 Ed.2 versions ant\u00e9rieures \u00e0 03.27", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SITOP UPS1600 10 A Ethernet/ PROFINET versions ant\u00e9rieures \u00e0 2.5.4", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "PowerSys versions ant\u00e9rieures \u00e0 3.11", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "ETA4 Ethernet Interface IEC60870-5-104 versions ant\u00e9rieures \u00e0 10.46", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "TIA Administrator versions ant\u00e9rieures \u00e0 3 SP2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "les applications Mendix utilisant Mendix 9 versions ant\u00e9rieures \u00e0 9.24.22", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "ST7 ScadaConnect versions ant\u00e9rieures \u00e0 1.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL versions ant\u00e9rieures \u00e0 2.3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Teamcenter Visualization 14.2 toutes versions, aucun correctif n\u0027est disponible", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "les produits SCALANCE, se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. section Documentation)", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL versions ant\u00e9rieures \u00e0 2.3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "les applications Mendix utilisant Mendix 10.6 versions ant\u00e9rieures \u00e0 10.6.9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2023-24895", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24895" }, { "name": "CVE-2023-49691", "url": "https://www.cve.org/CVERecord?id=CVE-2023-49691" }, { "name": "CVE-2024-35207", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35207" }, { "name": "CVE-2023-33135", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33135" }, { "name": "CVE-2024-33500", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33500" }, { "name": "CVE-2023-35390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35390" }, { "name": "CVE-2023-44317", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44317" }, { "name": "CVE-2024-35210", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35210" }, { "name": "CVE-2022-4304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304" }, { "name": "CVE-2023-38380", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38380" }, { "name": "CVE-2023-36794", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36794" }, { "name": "CVE-2024-36266", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36266" }, { "name": "CVE-2023-24897", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24897" }, { "name": "CVE-2022-44792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44792" }, { "name": "CVE-2022-42329", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42329" }, { "name": "CVE-2024-35206", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35206" }, { "name": "CVE-2023-0215", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215" }, { "name": "CVE-2023-35788", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35788" }, { "name": "CVE-2023-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286" }, { "name": "CVE-2023-24936", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24936" }, { "name": "CVE-2023-36792", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36792" }, { "name": "CVE-2022-3643", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3643" }, { "name": "CVE-2022-39189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39189" }, { "name": "CVE-2022-46144", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46144" }, { "name": "CVE-2022-3435", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3435" }, { "name": "CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "name": "CVE-2024-26277", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26277" }, { "name": "CVE-2022-40225", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40225" }, { "name": "CVE-2023-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0466" }, { "name": "CVE-2023-35828", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35828" }, { "name": "CVE-2023-36049", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36049" }, { "name": "CVE-2023-0465", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0465" }, { "name": "CVE-2022-44793", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44793" }, { "name": "CVE-2024-35211", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35211" }, { "name": "CVE-2023-33127", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33127" }, { "name": "CVE-2021-47178", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47178" }, { "name": "CVE-2022-45919", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45919" }, { "name": "CVE-2023-33170", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33170" }, { "name": "CVE-2023-33128", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33128" }, { "name": "CVE-2023-41910", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41910" }, { "name": "CVE-2023-28484", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28484" }, { "name": "CVE-2023-28319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28319" }, { "name": "CVE-2022-45886", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45886" }, { "name": "CVE-2022-1015", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1015" }, { "name": "CVE-2023-27321", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27321" }, { "name": "CVE-2024-31484", "url": "https://www.cve.org/CVERecord?id=CVE-2024-31484" }, { "name": "CVE-2023-0464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464" }, { "name": "CVE-2022-41742", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41742" }, { "name": "CVE-2022-3545", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3545" }, { "name": "CVE-2023-26552", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26552" }, { "name": "CVE-2023-29469", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29469" }, { "name": "CVE-2023-0160", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0160" }, { "name": "CVE-2024-35212", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35212" }, { "name": "CVE-2022-40303", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40303" }, { "name": "CVE-2023-21255", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21255" }, { "name": "CVE-2024-26275", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26275" }, { "name": "CVE-2023-38180", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38180" }, { "name": "CVE-2023-35824", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35824" }, { "name": "CVE-2024-35209", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35209" }, { "name": "CVE-2022-42328", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42328" }, { "name": "CVE-2023-35823", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35823" }, { "name": "CVE-2023-38178", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38178" }, { "name": "CVE-2022-45887", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45887" }, { "name": "CVE-2024-0775", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0775" }, { "name": "CVE-2023-44319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44319" }, { "name": "CVE-2023-32032", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32032" }, { "name": "CVE-2022-4450", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450" }, { "name": "CVE-2023-26554", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26554" }, { "name": "CVE-2023-2269", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2269" }, { "name": "CVE-2024-35208", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35208" }, { "name": "CVE-2024-26276", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26276" }, { "name": "CVE-2023-1017", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1017" }, { "name": "CVE-2023-38171", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38171" }, { "name": "CVE-2023-28260", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28260" }, { "name": "CVE-2023-50763", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50763" }, { "name": "CVE-2022-3623", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3623" }, { "name": "CVE-2022-2097", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2097" }, { "name": "CVE-2023-29331", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29331" }, { "name": "CVE-2023-44374", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44374" }, { "name": "CVE-2023-38533", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38533" }, { "name": "CVE-2023-35829", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35829" }, { "name": "CVE-2023-36038", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36038" }, { "name": "CVE-2023-21808", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21808" }, { "name": "CVE-2023-36799", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36799" }, { "name": "CVE-2023-36435", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36435" }, { "name": "CVE-2023-26553", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26553" }, { "name": "CVE-2022-40304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40304" }, { "name": "CVE-2023-35391", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35391" }, { "name": "CVE-2023-44373", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44373" }, { "name": "CVE-2023-39615", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39615" }, { "name": "CVE-2023-36796", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36796" }, { "name": "CVE-2023-3446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446" }, { "name": "CVE-2024-35303", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35303" }, { "name": "CVE-2023-5678", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678" }, { "name": "CVE-2024-35292", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35292" }, { "name": "CVE-2023-36558", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36558" }, { "name": "CVE-2023-2124", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2124" }, { "name": "CVE-2023-33126", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33126" }, { "name": "CVE-2023-52474", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52474" }, { "name": "CVE-2023-44318", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44318" }, { "name": "CVE-2023-36793", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36793" } ], "initial_release_date": "2024-06-11T00:00:00", "last_revision_date": "2024-06-11T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0478", "revisions": [ { "description": "Version initiale", "revision_date": "2024-06-11T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens", "vendor_advisories": [ { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-900277", "url": "https://cert-portal.siemens.com/productcert/html/ssa-900277.html" }, { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-620338", "url": "https://cert-portal.siemens.com/productcert/html/ssa-620338.html" }, { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-540640", "url": "https://cert-portal.siemens.com/productcert/html/ssa-540640.html" }, { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-238730", "url": "https://cert-portal.siemens.com/productcert/html/ssa-238730.html" }, { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-319319", "url": "https://cert-portal.siemens.com/productcert/html/ssa-319319.html" }, { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-879734", "url": "https://cert-portal.siemens.com/productcert/html/ssa-879734.html" }, { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-625862", "url": "https://cert-portal.siemens.com/productcert/html/ssa-625862.html" }, { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-481506", "url": "https://cert-portal.siemens.com/productcert/html/ssa-481506.html" }, { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-024584", "url": "https://cert-portal.siemens.com/productcert/html/ssa-024584.html" }, { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-196737", "url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html" }, { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-337522", "url": "https://cert-portal.siemens.com/productcert/html/ssa-337522.html" }, { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-341067", "url": "https://cert-portal.siemens.com/productcert/html/ssa-341067.html" }, { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-771940", "url": "https://cert-portal.siemens.com/productcert/html/ssa-771940.html" }, { "published_at": "2024-06-11", "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-690517", "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html" } ] }
CERTFR-2023-AVI-0318
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
VMware | N/A | Isolation Segment versions 2.12.x antérieures à 2.12.19 | ||
VMware | Tanzu | VMware Tanzu Application Service for VMs versions 2.12.x antérieures à 2.12.24 | ||
VMware | N/A | Canonical Ubuntu 18.04 | ||
VMware | Tanzu | VMware Tanzu Application Service for VMs versions 2.13.x antérieures à 2.13.17 | ||
VMware | N/A | Platform Automation Toolkit versions 4.0.x antérieures à to 4.0.13 | ||
VMware | Tanzu | VMware Tanzu Application Service for VMs versions 2.11.x antérieures à 2.11.35 | ||
VMware | N/A | Platform Automation Toolkit versions 4.3.x versions antérieures à 4.3.5 | ||
VMware | N/A | Platform Automation Toolkit versions 5.1.x versions antérieures à 5.1.0 | ||
VMware | N/A | Operations Manager versions 3.0.x antérieures à 3.0.4 | ||
VMware | N/A | Operations Manager versions 2.10.x antérieures à 2.10.51 | ||
VMware | N/A | Isolation Segment versions 3.0.x antérieures à 3.0.7 (avec Jammy Stemcells versions antérieures à 1.80) | ||
VMware | N/A | Isolation Segment versions 2.11.x antérieures à 2.11.29 | ||
VMware | N/A | Platform Automation Toolkit versions 4.2.x antérieures à 4.2.8 | ||
VMware | N/A | Canonical Ubuntu 16.04 | ||
VMware | N/A | Platform Automation Toolkit versions 4.4.x versions antérieures à 4.4.30 | ||
VMware | N/A | Canonical Ubuntu 22.04 | ||
VMware | Tanzu | VMware Tanzu Application Service for VMs versions 3.0.x antérieures à 3.0.7 (avec Jammy Stemcells versions 1.80) | ||
VMware | N/A | Platform Automation Toolkit versions 5.0.x versions antérieures à 5.0.23 | ||
VMware | N/A | Isolation Segment versions 2.13.x antérieures à 2.13.14 | ||
VMware | Tanzu | Tanzu Greenplum for Kubernetes versions antérieures à 1.4.0 | ||
VMware | N/A | Platform Automation Toolkit versions 4.1.x antérieures à 4.1.13 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Isolation Segment versions 2.12.x ant\u00e9rieures \u00e0 2.12.19", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware Tanzu Application Service for VMs versions 2.12.x ant\u00e9rieures \u00e0 2.12.24", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Canonical Ubuntu 18.04", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware Tanzu Application Service for VMs versions 2.13.x ant\u00e9rieures \u00e0 2.13.17", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Platform Automation Toolkit versions 4.0.x ant\u00e9rieures \u00e0 to 4.0.13", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware Tanzu Application Service for VMs versions 2.11.x ant\u00e9rieures \u00e0 2.11.35", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Platform Automation Toolkit versions 4.3.x versions ant\u00e9rieures \u00e0 4.3.5", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Platform Automation Toolkit versions 5.1.x versions ant\u00e9rieures \u00e0 5.1.0", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Operations Manager versions 3.0.x ant\u00e9rieures \u00e0 3.0.4", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Operations Manager versions 2.10.x ant\u00e9rieures \u00e0 2.10.51", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Isolation Segment versions 3.0.x ant\u00e9rieures \u00e0 3.0.7 (avec Jammy Stemcells versions ant\u00e9rieures \u00e0 1.80)", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Isolation Segment versions 2.11.x ant\u00e9rieures \u00e0 2.11.29", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Platform Automation Toolkit versions 4.2.x ant\u00e9rieures \u00e0 4.2.8", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Canonical Ubuntu 16.04", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Platform Automation Toolkit versions 4.4.x versions ant\u00e9rieures \u00e0 4.4.30", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Canonical Ubuntu 22.04", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware Tanzu Application Service for VMs versions 3.0.x ant\u00e9rieures \u00e0 3.0.7 (avec Jammy Stemcells versions 1.80)", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Platform Automation Toolkit versions 5.0.x versions ant\u00e9rieures \u00e0 5.0.23", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Isolation Segment versions 2.13.x ant\u00e9rieures \u00e0 2.13.14", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum for Kubernetes versions ant\u00e9rieures \u00e0 1.4.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Platform Automation Toolkit versions 4.1.x ant\u00e9rieures \u00e0 4.1.13", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-24809", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24809" }, { "name": "CVE-2022-47629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-47629" }, { "name": "CVE-2022-24805", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24805" }, { "name": "CVE-2022-44792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44792" }, { "name": "CVE-2022-45061", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45061" }, { "name": "CVE-2022-4883", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4883" }, { "name": "CVE-2022-44793", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44793" }, { "name": "CVE-2022-3165", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3165" }, { "name": "CVE-2022-0417", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0417" }, { "name": "CVE-2022-24807", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24807" }, { "name": "CVE-2022-24810", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24810" }, { "name": "CVE-2022-37454", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37454" }, { "name": "CVE-2022-44617", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44617" }, { "name": "CVE-2021-3682", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3682" }, { "name": "CVE-2021-23222", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23222" }, { "name": "CVE-2022-2962", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2962" }, { "name": "CVE-2023-22809", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22809" }, { "name": "CVE-2022-0392", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0392" }, { "name": "CVE-2022-33070", "url": "https://www.cve.org/CVERecord?id=CVE-2022-33070" }, { "name": "CVE-2022-0216", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0216" }, { "name": "CVE-2022-40898", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40898" }, { "name": "CVE-2022-24806", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24806" }, { "name": "CVE-2022-46285", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46285" }, { "name": "CVE-2021-3930", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3930" }, { "name": "CVE-2021-33621", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33621" }, { "name": "CVE-2022-24808", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24808" }, { "name": "CVE-2021-3750", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3750" } ], "initial_release_date": "2023-04-17T00:00:00", "last_revision_date": "2023-04-17T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0318", "revisions": [ { "description": "Version initiale", "revision_date": "2023-04-17T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eVMware\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de\nprivil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5795-1 du 13 avril 2023", "url": "https://tanzu.vmware.com/security/usn-5787-1" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5795-2 du 13 avril 2023", "url": "https://tanzu.vmware.com/security/usn-5787-2" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5787-2 du 13 avril 2023", "url": "https://tanzu.vmware.com/security/usn-5772-1" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5765-1 du 13 avril 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5821-1 du 13 avril 2023", "url": "https://tanzu.vmware.com/security/usn-5821-1" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5801-1 du 13 avril 2023", "url": "https://tanzu.vmware.com/security/usn-5795-2" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5811-1 du 13 avril 2023", "url": "https://tanzu.vmware.com/security/usn-5811-1" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5787-1 du 13 avril 2023", "url": "https://tanzu.vmware.com/security/usn-5767-1" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5806-1 du 13 avril 2023", "url": "https://tanzu.vmware.com/security/usn-5801-1" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5807-1 du 13 avril 2023", "url": "https://tanzu.vmware.com/security/usn-5807-1" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5787-1 du 12 avril 2023", "url": "https://tanzu.vmware.com/security/usn-5765-1" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5806-2 du 13 avril 2023", "url": "https://tanzu.vmware.com/security/usn-5806-2" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5772-1 du 13 avril 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5767-1 du 13 avril 2023", "url": null } ] }
gsd-2022-44793
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-44793", "description": "handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "id": "GSD-2022-44793", "references": [ "https://www.suse.com/security/cve/CVE-2022-44793.html", "https://ubuntu.com/security/CVE-2022-44793", "https://advisories.mageia.org/CVE-2022-44793.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-44793" ], "details": "handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "id": "GSD-2022-44793", "modified": "2023-12-13T01:19:25.042811Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-44793", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/net-snmp/net-snmp/issues/475", "refsource": "MISC", "url": "https://github.com/net-snmp/net-snmp/issues/475" }, { "name": "https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f", "refsource": "MISC", "url": "https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f" }, { "name": "[debian-lts-announce] 20230115 [SECURITY] [DLA 3270-1] net-snmp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html" }, { "name": "https://security.netapp.com/advisory/ntap-20230223-0011/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20230223-0011/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.9.3", "versionStartIncluding": "5.4.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-44793" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/net-snmp/net-snmp/issues/475", "refsource": "MISC", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/net-snmp/net-snmp/issues/475" }, { "name": "https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f" }, { "name": "[debian-lts-announce] 20230115 [SECURITY] [DLA 3270-1] net-snmp security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html" }, { "name": "https://security.netapp.com/advisory/ntap-20230223-0011/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230223-0011/" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2023-03-28T17:17Z", "publishedDate": "2022-11-07T03:15Z" } } }
ncsc-2024-0246
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Siemens heeft kwetsbaarheden verholpen in diverse producten, zoals SCALANCE, SICAM, Tecnomatix, SITOP en PowerSys.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van beveiligingsmaatregel\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.\n", "title": "Interpretaties" }, { "category": "description", "text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Insufficient Granularity of Access Control", "title": "CWE-1220" }, { "category": "general", "text": "Write-what-where Condition", "title": "CWE-123" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "Improper Null Termination", "title": "CWE-170" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "Improper Authentication", "title": "CWE-287" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "general", "text": "Cleartext Transmission of Sensitive Information", "title": "CWE-319" }, { "category": "general", "text": "Use of Hard-coded Cryptographic Key", "title": "CWE-321" }, { "category": "general", "text": "Missing Cryptographic Step", "title": "CWE-325" }, { "category": "general", "text": "Inadequate Encryption Strength", "title": "CWE-326" }, { "category": "general", "text": "Use of Weak Hash", "title": "CWE-328" }, { "category": "general", "text": "Use of Insufficiently Random Values", "title": "CWE-330" }, { "category": "general", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" }, { "category": "general", "text": "Cross-Site Request Forgery (CSRF)", "title": "CWE-352" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Creation of Temporary File in Directory with Insecure Permissions", "title": "CWE-379" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Insufficiently Protected Credentials", "title": "CWE-522" }, { "category": "general", "text": "Unsynchronized Access to Shared Data in a Multithreaded Context", "title": "CWE-567" }, { "category": "general", "text": "Insufficient Session Expiration", "title": "CWE-613" }, { "category": "general", "text": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute", "title": "CWE-614" }, { "category": "general", "text": "Improper Control of a Resource Through its Lifetime", "title": "CWE-664" }, { "category": "general", "text": "Improper Locking", "title": "CWE-667" }, { "category": "general", "text": "Incorrect Type Conversion or Cast", "title": "CWE-704" }, { "category": "general", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" }, { "category": "general", "text": "Exposed Dangerous Method or Function", "title": "CWE-749" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Deadlock", "title": "CWE-833" }, { "category": "general", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-024584.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-196737.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-238730.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-319319.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-337522.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-341067.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-481506.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-540640.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620338.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-625862.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-690517.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-879734.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-900277.pdf" } ], "title": "Kwetsbaarheden verholpen in Siemens producten", "tracking": { "current_release_date": "2024-06-11T13:29:25.912614Z", "id": "NCSC-2024-0246", "initial_release_date": "2024-06-11T13:29:25.912614Z", "revision_history": [ { "date": "2024-06-11T13:29:25.912614Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "mendix", "product": { "name": "mendix", "product_id": "CSAFPID-538452", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:mendix:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "simatic", "product": { "name": "simatic", "product_id": "CSAFPID-166121", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:simatic:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sinec-nms", "product": { "name": "sinec-nms", "product_id": "CSAFPID-163798", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:sinec-nms:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "tecnomatix_plant_simulation", "product": { "name": "tecnomatix_plant_simulation", "product_id": "CSAFPID-166120", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "tia_administrator", "product": { "name": "tia_administrator", "product_id": "CSAFPID-766096", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:tia_administrator:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "scalance_w700", "product": { "name": "scalance_w700", "product_id": "CSAFPID-1009262", "product_identification_helper": { "cpe": "cpe:2.3:h:siemens:scalance_w700:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "scalance_xm-400", "product": { "name": "scalance_xm-400", "product_id": "CSAFPID-1014214", "product_identification_helper": { "cpe": "cpe:2.3:h:siemens:scalance_xm-400:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "scalance_xr-500", "product": { "name": "scalance_xr-500", "product_id": "CSAFPID-1014213", "product_identification_helper": { "cpe": "cpe:2.3:h:siemens:scalance_xr-500:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sicam_ak_3", "product": { "name": "sicam_ak_3", "product_id": "CSAFPID-1007975", "product_identification_helper": { "cpe": "cpe:2.3:h:siemens:sicam_ak_3:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sicam_bc", "product": { "name": "sicam_bc", "product_id": "CSAFPID-1007979", "product_identification_helper": { "cpe": "cpe:2.3:h:siemens:sicam_bc:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sicam_tm", "product": { "name": "sicam_tm", "product_id": "CSAFPID-1007978", "product_identification_helper": { "cpe": "cpe:2.3:h:siemens:sicam_tm:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siplus_tim_1531_irc", "product": { "name": "siplus_tim_1531_irc", "product_id": "CSAFPID-1326635", "product_identification_helper": { "cpe": "cpe:2.3:h:siemens:siplus_tim_1531_irc:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sitop_ups1600", "product": { "name": "sitop_ups1600", "product_id": "CSAFPID-1037908", "product_identification_helper": { "cpe": "cpe:2.3:h:siemens:sitop_ups1600:-:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-28319", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2023-28319", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28319.json" } ], "title": "CVE-2023-28319" }, { "cve": "CVE-2023-28484", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2023-28484", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json" } ], "title": "CVE-2023-28484" }, { "cve": "CVE-2023-29331", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2023-29331", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29331.json" } ], "title": "CVE-2023-29331" }, { "cve": "CVE-2023-29469", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "references": [ { "category": "self", "summary": "CVE-2023-29469", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json" } ], "title": "CVE-2023-29469" }, { "cve": "CVE-2023-32032", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-32032", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32032.json" } ], "title": "CVE-2023-32032" }, { "cve": "CVE-2023-33126", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-33126", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33126.json" } ], "title": "CVE-2023-33126" }, { "cve": "CVE-2023-33127", "cwe": { "id": "CWE-1220", "name": "Insufficient Granularity of Access Control" }, "notes": [ { "category": "other", "text": "Insufficient Granularity of Access Control", "title": "CWE-1220" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-33127", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33127.json" } ], "title": "CVE-2023-33127" }, { "cve": "CVE-2023-33128", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2023-33128", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33128.json" } ], "title": "CVE-2023-33128" }, { "cve": "CVE-2023-33135", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-33135", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33135.json" } ], "title": "CVE-2023-33135" }, { "cve": "CVE-2023-33170", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-33170", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33170.json" } ], "title": "CVE-2023-33170" }, { "cve": "CVE-2023-35390", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-35390", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35390.json" } ], "title": "CVE-2023-35390" }, { "cve": "CVE-2023-35391", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-35391", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35391.json" } ], "title": "CVE-2023-35391" }, { "cve": "CVE-2023-35788", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2023-35788", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35788.json" } ], "title": "CVE-2023-35788" }, { "cve": "CVE-2023-35823", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "references": [ { "category": "self", "summary": "CVE-2023-35823", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35823.json" } ], "title": "CVE-2023-35823" }, { "cve": "CVE-2023-35824", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "references": [ { "category": "self", "summary": "CVE-2023-35824", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35824.json" } ], "title": "CVE-2023-35824" }, { "cve": "CVE-2023-35828", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "references": [ { "category": "self", "summary": "CVE-2023-35828", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35828.json" } ], "title": "CVE-2023-35828" }, { "cve": "CVE-2023-35829", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2023-35829", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35829.json" } ], "title": "CVE-2023-35829" }, { "cve": "CVE-2023-36038", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-36038", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36038.json" } ], "title": "CVE-2023-36038" }, { "cve": "CVE-2023-36049", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "references": [ { "category": "self", "summary": "CVE-2023-36049", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36049.json" } ], "title": "CVE-2023-36049" }, { "cve": "CVE-2023-36435", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-36435", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36435.json" } ], "title": "CVE-2023-36435" }, { "cve": "CVE-2023-36558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-36558", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36558.json" } ], "title": "CVE-2023-36558" }, { "cve": "CVE-2023-36792", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2023-36792", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36792.json" } ], "title": "CVE-2023-36792" }, { "cve": "CVE-2023-36793", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2023-36793", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36793.json" } ], "title": "CVE-2023-36793" }, { "cve": "CVE-2023-36794", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "references": [ { "category": "self", "summary": "CVE-2023-36794", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36794.json" } ], "title": "CVE-2023-36794" }, { "cve": "CVE-2023-36796", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "references": [ { "category": "self", "summary": "CVE-2023-36796", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36796.json" } ], "title": "CVE-2023-36796" }, { "cve": "CVE-2023-36799", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-36799", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36799.json" } ], "title": "CVE-2023-36799" }, { "cve": "CVE-2023-38171", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-38171", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38171.json" } ], "title": "CVE-2023-38171" }, { "cve": "CVE-2023-38178", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-38178", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38178.json" } ], "title": "CVE-2023-38178" }, { "cve": "CVE-2023-38180", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-38180", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38180.json" } ], "title": "CVE-2023-38180" }, { "cve": "CVE-2023-38380", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "references": [ { "category": "self", "summary": "CVE-2023-38380", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38380.json" } ], "title": "CVE-2023-38380" }, { "cve": "CVE-2023-38533", "cwe": { "id": "CWE-379", "name": "Creation of Temporary File in Directory with Insecure Permissions" }, "notes": [ { "category": "other", "text": "Creation of Temporary File in Directory with Insecure Permissions", "title": "CWE-379" } ], "references": [ { "category": "self", "summary": "CVE-2023-38533", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38533.json" } ], "title": "CVE-2023-38533" }, { "cve": "CVE-2023-39615", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "references": [ { "category": "self", "summary": "CVE-2023-39615", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39615.json" } ], "title": "CVE-2023-39615" }, { "cve": "CVE-2023-41910", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2023-41910", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41910.json" } ], "title": "CVE-2023-41910" }, { "cve": "CVE-2023-44317", "cwe": { "id": "CWE-349", "name": "Acceptance of Extraneous Untrusted Data With Trusted Data" }, "notes": [ { "category": "other", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" } ], "references": [ { "category": "self", "summary": "CVE-2023-44317", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44317.json" } ], "title": "CVE-2023-44317" }, { "cve": "CVE-2023-44318", "cwe": { "id": "CWE-321", "name": "Use of Hard-coded Cryptographic Key" }, "notes": [ { "category": "other", "text": "Use of Hard-coded Cryptographic Key", "title": "CWE-321" } ], "references": [ { "category": "self", "summary": "CVE-2023-44318", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44318.json" } ], "title": "CVE-2023-44318" }, { "cve": "CVE-2023-44319", "cwe": { "id": "CWE-328", "name": "Use of Weak Hash" }, "notes": [ { "category": "other", "text": "Use of Weak Hash", "title": "CWE-328" } ], "references": [ { "category": "self", "summary": "CVE-2023-44319", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44319.json" } ], "title": "CVE-2023-44319" }, { "cve": "CVE-2023-44373", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" } ], "references": [ { "category": "self", "summary": "CVE-2023-44373", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44373.json" } ], "title": "CVE-2023-44373" }, { "cve": "CVE-2023-44374", "cwe": { "id": "CWE-567", "name": "Unsynchronized Access to Shared Data in a Multithreaded Context" }, "notes": [ { "category": "other", "text": "Unsynchronized Access to Shared Data in a Multithreaded Context", "title": "CWE-567" } ], "references": [ { "category": "self", "summary": "CVE-2023-44374", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44374.json" } ], "title": "CVE-2023-44374" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2023-44487", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json" } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-49691", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "references": [ { "category": "self", "summary": "CVE-2023-49691", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49691.json" } ], "title": "CVE-2023-49691" }, { "cve": "CVE-2023-50763", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "references": [ { "category": "self", "summary": "CVE-2023-50763", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50763.json" } ], "title": "CVE-2023-50763" }, { "cve": "CVE-2023-52474", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-52474", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52474.json" } ], "title": "CVE-2023-52474" }, { "cve": "CVE-2024-0775", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-0775", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0775.json" } ], "title": "CVE-2024-0775" }, { "cve": "CVE-2024-31484", "cwe": { "id": "CWE-170", "name": "Improper Null Termination" }, "notes": [ { "category": "other", "text": "Improper Null Termination", "title": "CWE-170" } ], "references": [ { "category": "self", "summary": "CVE-2024-31484", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31484.json" } ], "title": "CVE-2024-31484" }, { "cve": "CVE-2024-33500", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" } ], "references": [ { "category": "self", "summary": "CVE-2024-33500", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33500.json" } ], "title": "CVE-2024-33500" }, { "cve": "CVE-2024-35206", "cwe": { "id": "CWE-613", "name": "Insufficient Session Expiration" }, "notes": [ { "category": "other", "text": "Insufficient Session Expiration", "title": "CWE-613" } ], "references": [ { "category": "self", "summary": "CVE-2024-35206", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35206.json" } ], "title": "CVE-2024-35206" }, { "cve": "CVE-2024-35207", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "notes": [ { "category": "other", "text": "Cross-Site Request Forgery (CSRF)", "title": "CWE-352" } ], "references": [ { "category": "self", "summary": "CVE-2024-35207", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35207.json" } ], "title": "CVE-2024-35207" }, { "cve": "CVE-2024-35208", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "other", "text": "Insufficiently Protected Credentials", "title": "CWE-522" } ], "references": [ { "category": "self", "summary": "CVE-2024-35208", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35208.json" } ], "title": "CVE-2024-35208" }, { "cve": "CVE-2024-35209", "cwe": { "id": "CWE-749", "name": "Exposed Dangerous Method or Function" }, "notes": [ { "category": "other", "text": "Exposed Dangerous Method or Function", "title": "CWE-749" } ], "references": [ { "category": "self", "summary": "CVE-2024-35209", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35209.json" } ], "title": "CVE-2024-35209" }, { "cve": "CVE-2024-35210", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "other", "text": "Cleartext Transmission of Sensitive Information", "title": "CWE-319" } ], "references": [ { "category": "self", "summary": "CVE-2024-35210", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35210.json" } ], "title": "CVE-2024-35210" }, { "cve": "CVE-2024-35211", "cwe": { "id": "CWE-614", "name": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute" }, "notes": [ { "category": "other", "text": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute", "title": "CWE-614" } ], "references": [ { "category": "self", "summary": "CVE-2024-35211", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35211.json" } ], "title": "CVE-2024-35211" }, { "cve": "CVE-2024-35212", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-35212", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35212.json" } ], "title": "CVE-2024-35212" }, { "cve": "CVE-2024-35292", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "other", "text": "Use of Insufficiently Random Values", "title": "CWE-330" } ], "references": [ { "category": "self", "summary": "CVE-2024-35292", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35292.json" } ], "title": "CVE-2024-35292" }, { "cve": "CVE-2024-35303", "cwe": { "id": "CWE-704", "name": "Incorrect Type Conversion or Cast" }, "notes": [ { "category": "other", "text": "Incorrect Type Conversion or Cast", "title": "CWE-704" } ], "product_status": { "known_affected": [ "CSAFPID-166120" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35303", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35303.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-166120" ] } ], "title": "CVE-2024-35303" }, { "cve": "CVE-2024-36266", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" } ], "references": [ { "category": "self", "summary": "CVE-2024-36266", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36266.json" } ], "title": "CVE-2024-36266" }, { "cve": "CVE-2021-47178", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2021-47178", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-47178.json" } ], "title": "CVE-2021-47178" }, { "cve": "CVE-2022-1015", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2022-1015", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1015.json" } ], "title": "CVE-2022-1015" }, { "cve": "CVE-2022-2097", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "other", "text": "Inadequate Encryption Strength", "title": "CWE-326" }, { "category": "other", "text": "Missing Cryptographic Step", "title": "CWE-325" } ], "references": [ { "category": "self", "summary": "CVE-2022-2097", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2097.json" } ], "title": "CVE-2022-2097" }, { "cve": "CVE-2022-3435", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2022-3435", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3435.json" } ], "title": "CVE-2022-3435" }, { "cve": "CVE-2022-3545", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2022-3545", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3545.json" } ], "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3623", "cwe": { "id": "CWE-123", "name": "Write-what-where Condition" }, "notes": [ { "category": "other", "text": "Write-what-where Condition", "title": "CWE-123" }, { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "references": [ { "category": "self", "summary": "CVE-2022-3623", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3623.json" } ], "title": "CVE-2022-3623" }, { "cve": "CVE-2022-3643", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" } ], "references": [ { "category": "self", "summary": "CVE-2022-3643", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3643.json" } ], "title": "CVE-2022-3643" }, { "cve": "CVE-2022-4304", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "other", "text": "Inadequate Encryption Strength", "title": "CWE-326" } ], "references": [ { "category": "self", "summary": "CVE-2022-4304", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-4304.json" } ], "title": "CVE-2022-4304" }, { "cve": "CVE-2022-4450", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "references": [ { "category": "self", "summary": "CVE-2022-4450", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-4450.json" } ], "title": "CVE-2022-4450" }, { "cve": "CVE-2022-36323", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" } ], "references": [ { "category": "self", "summary": "CVE-2022-36323", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36323.json" } ], "title": "CVE-2022-36323" }, { "cve": "CVE-2022-39189", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" } ], "references": [ { "category": "self", "summary": "CVE-2022-39189", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-39189.json" } ], "title": "CVE-2022-39189" }, { "cve": "CVE-2022-40225", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "references": [ { "category": "self", "summary": "CVE-2022-40225", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40225.json" } ], "title": "CVE-2022-40225" }, { "cve": "CVE-2022-40303", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2022-40303", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40303.json" } ], "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "references": [ { "category": "self", "summary": "CVE-2022-40304", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40304.json" } ], "title": "CVE-2022-40304" }, { "cve": "CVE-2022-41742", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2022-41742", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41742.json" } ], "title": "CVE-2022-41742" }, { "cve": "CVE-2022-42328", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "other", "text": "Improper Locking", "title": "CWE-667" } ], "references": [ { "category": "self", "summary": "CVE-2022-42328", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42328.json" } ], "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "other", "text": "Improper Locking", "title": "CWE-667" } ], "references": [ { "category": "self", "summary": "CVE-2022-42329", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42329.json" } ], "title": "CVE-2022-42329" }, { "cve": "CVE-2022-44792", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2022-44792", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-44792.json" } ], "title": "CVE-2022-44792" }, { "cve": "CVE-2022-44793", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2022-44793", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-44793.json" } ], "title": "CVE-2022-44793" }, { "cve": "CVE-2022-45886", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2022-45886", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45886.json" } ], "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "references": [ { "category": "self", "summary": "CVE-2022-45887", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45887.json" } ], "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2022-45919", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45919.json" } ], "title": "CVE-2022-45919" }, { "cve": "CVE-2022-46144", "cwe": { "id": "CWE-664", "name": "Improper Control of a Resource Through its Lifetime" }, "notes": [ { "category": "other", "text": "Improper Control of a Resource Through its Lifetime", "title": "CWE-664" } ], "references": [ { "category": "self", "summary": "CVE-2022-46144", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46144.json" } ], "title": "CVE-2022-46144" }, { "cve": "CVE-2023-0160", "cwe": { "id": "CWE-833", "name": "Deadlock" }, "notes": [ { "category": "other", "text": "Deadlock", "title": "CWE-833" }, { "category": "other", "text": "Improper Locking", "title": "CWE-667" } ], "references": [ { "category": "self", "summary": "CVE-2023-0160", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0160.json" } ], "title": "CVE-2023-0160" }, { "cve": "CVE-2023-0215", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2023-0215", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0215.json" } ], "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-704", "name": "Incorrect Type Conversion or Cast" }, "notes": [ { "category": "other", "text": "Incorrect Type Conversion or Cast", "title": "CWE-704" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-0286", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0286.json" } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0464", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2023-0464", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0464.json" } ], "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" } ], "references": [ { "category": "self", "summary": "CVE-2023-0465", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0465.json" } ], "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" } ], "references": [ { "category": "self", "summary": "CVE-2023-0466", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0466.json" } ], "title": "CVE-2023-0466" }, { "cve": "CVE-2023-1017", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2023-1017", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-1017.json" } ], "title": "CVE-2023-1017" }, { "cve": "CVE-2023-2124", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2023-2124", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2124.json" } ], "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2269", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "other", "text": "Improper Locking", "title": "CWE-667" } ], "references": [ { "category": "self", "summary": "CVE-2023-2269", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2269.json" } ], "title": "CVE-2023-2269" }, { "cve": "CVE-2023-3446", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" } ], "references": [ { "category": "self", "summary": "CVE-2023-3446", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3446.json" } ], "title": "CVE-2023-3446" }, { "cve": "CVE-2023-3817", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Excessive Iteration", "title": "CWE-834" } ], "references": [ { "category": "self", "summary": "CVE-2023-3817", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3817.json" } ], "title": "CVE-2023-3817" }, { "cve": "CVE-2023-5678", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "other", "text": "Missing Cryptographic Step", "title": "CWE-325" } ], "references": [ { "category": "self", "summary": "CVE-2023-5678", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json" } ], "title": "CVE-2023-5678" }, { "cve": "CVE-2023-21255", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2023-21255", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-21255.json" } ], "title": "CVE-2023-21255" }, { "cve": "CVE-2023-21808", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2023-21808", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-21808.json" } ], "title": "CVE-2023-21808" }, { "cve": "CVE-2023-24895", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-24895", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24895.json" } ], "title": "CVE-2023-24895" }, { "cve": "CVE-2023-24897", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2023-24897", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24897.json" } ], "title": "CVE-2023-24897" }, { "cve": "CVE-2023-24936", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-24936", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24936.json" } ], "title": "CVE-2023-24936" }, { "cve": "CVE-2023-26552", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2023-26552", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json" } ], "title": "CVE-2023-26552" }, { "cve": "CVE-2023-26553", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2023-26553", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json" } ], "title": "CVE-2023-26553" }, { "cve": "CVE-2023-26554", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2023-26554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json" } ], "title": "CVE-2023-26554" }, { "cve": "CVE-2023-27321", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2023-27321", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27321.json" } ], "title": "CVE-2023-27321" }, { "cve": "CVE-2023-28260", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-28260", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28260.json" } ], "title": "CVE-2023-28260" } ] }
NCSC-2024-0246
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Siemens heeft kwetsbaarheden verholpen in diverse producten, zoals SCALANCE, SICAM, Tecnomatix, SITOP en PowerSys.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van beveiligingsmaatregel\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.\n", "title": "Interpretaties" }, { "category": "description", "text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Insufficient Granularity of Access Control", "title": "CWE-1220" }, { "category": "general", "text": "Write-what-where Condition", "title": "CWE-123" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "Improper Null Termination", "title": "CWE-170" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "Improper Authentication", "title": "CWE-287" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "general", "text": "Cleartext Transmission of Sensitive Information", "title": "CWE-319" }, { "category": "general", "text": "Use of Hard-coded Cryptographic Key", "title": "CWE-321" }, { "category": "general", "text": "Missing Cryptographic Step", "title": "CWE-325" }, { "category": "general", "text": "Inadequate Encryption Strength", "title": "CWE-326" }, { "category": "general", "text": "Use of Weak Hash", "title": "CWE-328" }, { "category": "general", "text": "Use of Insufficiently Random Values", "title": "CWE-330" }, { "category": "general", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" }, { "category": "general", "text": "Cross-Site Request Forgery (CSRF)", "title": "CWE-352" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Creation of Temporary File in Directory with Insecure Permissions", "title": "CWE-379" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Insufficiently Protected Credentials", "title": "CWE-522" }, { "category": "general", "text": "Unsynchronized Access to Shared Data in a Multithreaded Context", "title": "CWE-567" }, { "category": "general", "text": "Insufficient Session Expiration", "title": "CWE-613" }, { "category": "general", "text": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute", "title": "CWE-614" }, { "category": "general", "text": "Improper Control of a Resource Through its Lifetime", "title": "CWE-664" }, { "category": "general", "text": "Improper Locking", "title": "CWE-667" }, { "category": "general", "text": "Incorrect Type Conversion or Cast", "title": "CWE-704" }, { "category": "general", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" }, { "category": "general", "text": "Exposed Dangerous Method or Function", "title": "CWE-749" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Deadlock", "title": "CWE-833" }, { "category": "general", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-024584.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-196737.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-238730.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-319319.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-337522.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-341067.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-481506.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-540640.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620338.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-625862.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-690517.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-879734.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-900277.pdf" } ], "title": "Kwetsbaarheden verholpen in Siemens producten", "tracking": { "current_release_date": "2024-06-11T13:29:25.912614Z", "id": "NCSC-2024-0246", "initial_release_date": "2024-06-11T13:29:25.912614Z", "revision_history": [ { "date": "2024-06-11T13:29:25.912614Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "mendix", "product": { "name": "mendix", "product_id": "CSAFPID-538452", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:mendix:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "simatic", "product": { "name": "simatic", "product_id": "CSAFPID-166121", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:simatic:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sinec-nms", "product": { "name": "sinec-nms", "product_id": "CSAFPID-163798", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:sinec-nms:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "tecnomatix_plant_simulation", "product": { "name": "tecnomatix_plant_simulation", "product_id": "CSAFPID-166120", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "tia_administrator", "product": { "name": "tia_administrator", "product_id": "CSAFPID-766096", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:tia_administrator:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "scalance_w700", "product": { "name": "scalance_w700", "product_id": "CSAFPID-1009262", "product_identification_helper": { "cpe": "cpe:2.3:h:siemens:scalance_w700:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "scalance_xm-400", "product": { "name": "scalance_xm-400", "product_id": "CSAFPID-1014214", "product_identification_helper": { "cpe": "cpe:2.3:h:siemens:scalance_xm-400:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "scalance_xr-500", "product": { "name": "scalance_xr-500", "product_id": "CSAFPID-1014213", "product_identification_helper": { "cpe": "cpe:2.3:h:siemens:scalance_xr-500:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sicam_ak_3", "product": { "name": "sicam_ak_3", "product_id": "CSAFPID-1007975", "product_identification_helper": { "cpe": "cpe:2.3:h:siemens:sicam_ak_3:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sicam_bc", "product": { "name": "sicam_bc", "product_id": "CSAFPID-1007979", "product_identification_helper": { "cpe": "cpe:2.3:h:siemens:sicam_bc:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sicam_tm", "product": { "name": "sicam_tm", "product_id": "CSAFPID-1007978", "product_identification_helper": { "cpe": "cpe:2.3:h:siemens:sicam_tm:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siplus_tim_1531_irc", "product": { "name": "siplus_tim_1531_irc", "product_id": "CSAFPID-1326635", "product_identification_helper": { "cpe": "cpe:2.3:h:siemens:siplus_tim_1531_irc:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sitop_ups1600", "product": { "name": "sitop_ups1600", "product_id": "CSAFPID-1037908", "product_identification_helper": { "cpe": "cpe:2.3:h:siemens:sitop_ups1600:-:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-28319", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2023-28319", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28319.json" } ], "title": "CVE-2023-28319" }, { "cve": "CVE-2023-28484", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2023-28484", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json" } ], "title": "CVE-2023-28484" }, { "cve": "CVE-2023-29331", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2023-29331", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29331.json" } ], "title": "CVE-2023-29331" }, { "cve": "CVE-2023-29469", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "references": [ { "category": "self", "summary": "CVE-2023-29469", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json" } ], "title": "CVE-2023-29469" }, { "cve": "CVE-2023-32032", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-32032", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32032.json" } ], "title": "CVE-2023-32032" }, { "cve": "CVE-2023-33126", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-33126", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33126.json" } ], "title": "CVE-2023-33126" }, { "cve": "CVE-2023-33127", "cwe": { "id": "CWE-1220", "name": "Insufficient Granularity of Access Control" }, "notes": [ { "category": "other", "text": "Insufficient Granularity of Access Control", "title": "CWE-1220" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-33127", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33127.json" } ], "title": "CVE-2023-33127" }, { "cve": "CVE-2023-33128", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2023-33128", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33128.json" } ], "title": "CVE-2023-33128" }, { "cve": "CVE-2023-33135", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-33135", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33135.json" } ], "title": "CVE-2023-33135" }, { "cve": "CVE-2023-33170", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-33170", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33170.json" } ], "title": "CVE-2023-33170" }, { "cve": "CVE-2023-35390", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-35390", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35390.json" } ], "title": "CVE-2023-35390" }, { "cve": "CVE-2023-35391", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-35391", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35391.json" } ], "title": "CVE-2023-35391" }, { "cve": "CVE-2023-35788", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2023-35788", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35788.json" } ], "title": "CVE-2023-35788" }, { "cve": "CVE-2023-35823", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "references": [ { "category": "self", "summary": "CVE-2023-35823", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35823.json" } ], "title": "CVE-2023-35823" }, { "cve": "CVE-2023-35824", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "references": [ { "category": "self", "summary": "CVE-2023-35824", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35824.json" } ], "title": "CVE-2023-35824" }, { "cve": "CVE-2023-35828", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "references": [ { "category": "self", "summary": "CVE-2023-35828", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35828.json" } ], "title": "CVE-2023-35828" }, { "cve": "CVE-2023-35829", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2023-35829", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35829.json" } ], "title": "CVE-2023-35829" }, { "cve": "CVE-2023-36038", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-36038", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36038.json" } ], "title": "CVE-2023-36038" }, { "cve": "CVE-2023-36049", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "references": [ { "category": "self", "summary": "CVE-2023-36049", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36049.json" } ], "title": "CVE-2023-36049" }, { "cve": "CVE-2023-36435", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-36435", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36435.json" } ], "title": "CVE-2023-36435" }, { "cve": "CVE-2023-36558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-36558", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36558.json" } ], "title": "CVE-2023-36558" }, { "cve": "CVE-2023-36792", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2023-36792", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36792.json" } ], "title": "CVE-2023-36792" }, { "cve": "CVE-2023-36793", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2023-36793", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36793.json" } ], "title": "CVE-2023-36793" }, { "cve": "CVE-2023-36794", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "references": [ { "category": "self", "summary": "CVE-2023-36794", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36794.json" } ], "title": "CVE-2023-36794" }, { "cve": "CVE-2023-36796", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "references": [ { "category": "self", "summary": "CVE-2023-36796", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36796.json" } ], "title": "CVE-2023-36796" }, { "cve": "CVE-2023-36799", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-36799", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36799.json" } ], "title": "CVE-2023-36799" }, { "cve": "CVE-2023-38171", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-38171", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38171.json" } ], "title": "CVE-2023-38171" }, { "cve": "CVE-2023-38178", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-38178", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38178.json" } ], "title": "CVE-2023-38178" }, { "cve": "CVE-2023-38180", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-38180", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38180.json" } ], "title": "CVE-2023-38180" }, { "cve": "CVE-2023-38380", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "references": [ { "category": "self", "summary": "CVE-2023-38380", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38380.json" } ], "title": "CVE-2023-38380" }, { "cve": "CVE-2023-38533", "cwe": { "id": "CWE-379", "name": "Creation of Temporary File in Directory with Insecure Permissions" }, "notes": [ { "category": "other", "text": "Creation of Temporary File in Directory with Insecure Permissions", "title": "CWE-379" } ], "references": [ { "category": "self", "summary": "CVE-2023-38533", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38533.json" } ], "title": "CVE-2023-38533" }, { "cve": "CVE-2023-39615", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "references": [ { "category": "self", "summary": "CVE-2023-39615", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39615.json" } ], "title": "CVE-2023-39615" }, { "cve": "CVE-2023-41910", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2023-41910", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41910.json" } ], "title": "CVE-2023-41910" }, { "cve": "CVE-2023-44317", "cwe": { "id": "CWE-349", "name": "Acceptance of Extraneous Untrusted Data With Trusted Data" }, "notes": [ { "category": "other", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" } ], "references": [ { "category": "self", "summary": "CVE-2023-44317", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44317.json" } ], "title": "CVE-2023-44317" }, { "cve": "CVE-2023-44318", "cwe": { "id": "CWE-321", "name": "Use of Hard-coded Cryptographic Key" }, "notes": [ { "category": "other", "text": "Use of Hard-coded Cryptographic Key", "title": "CWE-321" } ], "references": [ { "category": "self", "summary": "CVE-2023-44318", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44318.json" } ], "title": "CVE-2023-44318" }, { "cve": "CVE-2023-44319", "cwe": { "id": "CWE-328", "name": "Use of Weak Hash" }, "notes": [ { "category": "other", "text": "Use of Weak Hash", "title": "CWE-328" } ], "references": [ { "category": "self", "summary": "CVE-2023-44319", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44319.json" } ], "title": "CVE-2023-44319" }, { "cve": "CVE-2023-44373", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" } ], "references": [ { "category": "self", "summary": "CVE-2023-44373", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44373.json" } ], "title": "CVE-2023-44373" }, { "cve": "CVE-2023-44374", "cwe": { "id": "CWE-567", "name": "Unsynchronized Access to Shared Data in a Multithreaded Context" }, "notes": [ { "category": "other", "text": "Unsynchronized Access to Shared Data in a Multithreaded Context", "title": "CWE-567" } ], "references": [ { "category": "self", "summary": "CVE-2023-44374", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44374.json" } ], "title": "CVE-2023-44374" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2023-44487", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json" } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-49691", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "references": [ { "category": "self", "summary": "CVE-2023-49691", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49691.json" } ], "title": "CVE-2023-49691" }, { "cve": "CVE-2023-50763", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "references": [ { "category": "self", "summary": "CVE-2023-50763", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50763.json" } ], "title": "CVE-2023-50763" }, { "cve": "CVE-2023-52474", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-52474", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52474.json" } ], "title": "CVE-2023-52474" }, { "cve": "CVE-2024-0775", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-0775", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0775.json" } ], "title": "CVE-2024-0775" }, { "cve": "CVE-2024-31484", "cwe": { "id": "CWE-170", "name": "Improper Null Termination" }, "notes": [ { "category": "other", "text": "Improper Null Termination", "title": "CWE-170" } ], "references": [ { "category": "self", "summary": "CVE-2024-31484", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31484.json" } ], "title": "CVE-2024-31484" }, { "cve": "CVE-2024-33500", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" } ], "references": [ { "category": "self", "summary": "CVE-2024-33500", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33500.json" } ], "title": "CVE-2024-33500" }, { "cve": "CVE-2024-35206", "cwe": { "id": "CWE-613", "name": "Insufficient Session Expiration" }, "notes": [ { "category": "other", "text": "Insufficient Session Expiration", "title": "CWE-613" } ], "references": [ { "category": "self", "summary": "CVE-2024-35206", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35206.json" } ], "title": "CVE-2024-35206" }, { "cve": "CVE-2024-35207", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "notes": [ { "category": "other", "text": "Cross-Site Request Forgery (CSRF)", "title": "CWE-352" } ], "references": [ { "category": "self", "summary": "CVE-2024-35207", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35207.json" } ], "title": "CVE-2024-35207" }, { "cve": "CVE-2024-35208", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "other", "text": "Insufficiently Protected Credentials", "title": "CWE-522" } ], "references": [ { "category": "self", "summary": "CVE-2024-35208", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35208.json" } ], "title": "CVE-2024-35208" }, { "cve": "CVE-2024-35209", "cwe": { "id": "CWE-749", "name": "Exposed Dangerous Method or Function" }, "notes": [ { "category": "other", "text": "Exposed Dangerous Method or Function", "title": "CWE-749" } ], "references": [ { "category": "self", "summary": "CVE-2024-35209", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35209.json" } ], "title": "CVE-2024-35209" }, { "cve": "CVE-2024-35210", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "other", "text": "Cleartext Transmission of Sensitive Information", "title": "CWE-319" } ], "references": [ { "category": "self", "summary": "CVE-2024-35210", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35210.json" } ], "title": "CVE-2024-35210" }, { "cve": "CVE-2024-35211", "cwe": { "id": "CWE-614", "name": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute" }, "notes": [ { "category": "other", "text": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute", "title": "CWE-614" } ], "references": [ { "category": "self", "summary": "CVE-2024-35211", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35211.json" } ], "title": "CVE-2024-35211" }, { "cve": "CVE-2024-35212", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-35212", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35212.json" } ], "title": "CVE-2024-35212" }, { "cve": "CVE-2024-35292", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "other", "text": "Use of Insufficiently Random Values", "title": "CWE-330" } ], "references": [ { "category": "self", "summary": "CVE-2024-35292", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35292.json" } ], "title": "CVE-2024-35292" }, { "cve": "CVE-2024-35303", "cwe": { "id": "CWE-704", "name": "Incorrect Type Conversion or Cast" }, "notes": [ { "category": "other", "text": "Incorrect Type Conversion or Cast", "title": "CWE-704" } ], "product_status": { "known_affected": [ "CSAFPID-166120" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35303", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35303.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-166120" ] } ], "title": "CVE-2024-35303" }, { "cve": "CVE-2024-36266", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" } ], "references": [ { "category": "self", "summary": "CVE-2024-36266", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36266.json" } ], "title": "CVE-2024-36266" }, { "cve": "CVE-2021-47178", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2021-47178", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-47178.json" } ], "title": "CVE-2021-47178" }, { "cve": "CVE-2022-1015", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2022-1015", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1015.json" } ], "title": "CVE-2022-1015" }, { "cve": "CVE-2022-2097", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "other", "text": "Inadequate Encryption Strength", "title": "CWE-326" }, { "category": "other", "text": "Missing Cryptographic Step", "title": "CWE-325" } ], "references": [ { "category": "self", "summary": "CVE-2022-2097", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2097.json" } ], "title": "CVE-2022-2097" }, { "cve": "CVE-2022-3435", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2022-3435", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3435.json" } ], "title": "CVE-2022-3435" }, { "cve": "CVE-2022-3545", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2022-3545", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3545.json" } ], "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3623", "cwe": { "id": "CWE-123", "name": "Write-what-where Condition" }, "notes": [ { "category": "other", "text": "Write-what-where Condition", "title": "CWE-123" }, { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "references": [ { "category": "self", "summary": "CVE-2022-3623", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3623.json" } ], "title": "CVE-2022-3623" }, { "cve": "CVE-2022-3643", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" } ], "references": [ { "category": "self", "summary": "CVE-2022-3643", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3643.json" } ], "title": "CVE-2022-3643" }, { "cve": "CVE-2022-4304", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "other", "text": "Inadequate Encryption Strength", "title": "CWE-326" } ], "references": [ { "category": "self", "summary": "CVE-2022-4304", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-4304.json" } ], "title": "CVE-2022-4304" }, { "cve": "CVE-2022-4450", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "references": [ { "category": "self", "summary": "CVE-2022-4450", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-4450.json" } ], "title": "CVE-2022-4450" }, { "cve": "CVE-2022-36323", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" } ], "references": [ { "category": "self", "summary": "CVE-2022-36323", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36323.json" } ], "title": "CVE-2022-36323" }, { "cve": "CVE-2022-39189", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" } ], "references": [ { "category": "self", "summary": "CVE-2022-39189", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-39189.json" } ], "title": "CVE-2022-39189" }, { "cve": "CVE-2022-40225", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "references": [ { "category": "self", "summary": "CVE-2022-40225", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40225.json" } ], "title": "CVE-2022-40225" }, { "cve": "CVE-2022-40303", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2022-40303", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40303.json" } ], "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "references": [ { "category": "self", "summary": "CVE-2022-40304", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40304.json" } ], "title": "CVE-2022-40304" }, { "cve": "CVE-2022-41742", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2022-41742", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41742.json" } ], "title": "CVE-2022-41742" }, { "cve": "CVE-2022-42328", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "other", "text": "Improper Locking", "title": "CWE-667" } ], "references": [ { "category": "self", "summary": "CVE-2022-42328", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42328.json" } ], "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "other", "text": "Improper Locking", "title": "CWE-667" } ], "references": [ { "category": "self", "summary": "CVE-2022-42329", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42329.json" } ], "title": "CVE-2022-42329" }, { "cve": "CVE-2022-44792", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2022-44792", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-44792.json" } ], "title": "CVE-2022-44792" }, { "cve": "CVE-2022-44793", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2022-44793", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-44793.json" } ], "title": "CVE-2022-44793" }, { "cve": "CVE-2022-45886", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2022-45886", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45886.json" } ], "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "references": [ { "category": "self", "summary": "CVE-2022-45887", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45887.json" } ], "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2022-45919", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45919.json" } ], "title": "CVE-2022-45919" }, { "cve": "CVE-2022-46144", "cwe": { "id": "CWE-664", "name": "Improper Control of a Resource Through its Lifetime" }, "notes": [ { "category": "other", "text": "Improper Control of a Resource Through its Lifetime", "title": "CWE-664" } ], "references": [ { "category": "self", "summary": "CVE-2022-46144", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46144.json" } ], "title": "CVE-2022-46144" }, { "cve": "CVE-2023-0160", "cwe": { "id": "CWE-833", "name": "Deadlock" }, "notes": [ { "category": "other", "text": "Deadlock", "title": "CWE-833" }, { "category": "other", "text": "Improper Locking", "title": "CWE-667" } ], "references": [ { "category": "self", "summary": "CVE-2023-0160", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0160.json" } ], "title": "CVE-2023-0160" }, { "cve": "CVE-2023-0215", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2023-0215", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0215.json" } ], "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-704", "name": "Incorrect Type Conversion or Cast" }, "notes": [ { "category": "other", "text": "Incorrect Type Conversion or Cast", "title": "CWE-704" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-0286", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0286.json" } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0464", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2023-0464", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0464.json" } ], "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" } ], "references": [ { "category": "self", "summary": "CVE-2023-0465", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0465.json" } ], "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" } ], "references": [ { "category": "self", "summary": "CVE-2023-0466", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-0466.json" } ], "title": "CVE-2023-0466" }, { "cve": "CVE-2023-1017", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2023-1017", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-1017.json" } ], "title": "CVE-2023-1017" }, { "cve": "CVE-2023-2124", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2023-2124", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2124.json" } ], "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2269", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "other", "text": "Improper Locking", "title": "CWE-667" } ], "references": [ { "category": "self", "summary": "CVE-2023-2269", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2269.json" } ], "title": "CVE-2023-2269" }, { "cve": "CVE-2023-3446", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" } ], "references": [ { "category": "self", "summary": "CVE-2023-3446", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3446.json" } ], "title": "CVE-2023-3446" }, { "cve": "CVE-2023-3817", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Excessive Iteration", "title": "CWE-834" } ], "references": [ { "category": "self", "summary": "CVE-2023-3817", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3817.json" } ], "title": "CVE-2023-3817" }, { "cve": "CVE-2023-5678", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "other", "text": "Missing Cryptographic Step", "title": "CWE-325" } ], "references": [ { "category": "self", "summary": "CVE-2023-5678", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json" } ], "title": "CVE-2023-5678" }, { "cve": "CVE-2023-21255", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2023-21255", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-21255.json" } ], "title": "CVE-2023-21255" }, { "cve": "CVE-2023-21808", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2023-21808", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-21808.json" } ], "title": "CVE-2023-21808" }, { "cve": "CVE-2023-24895", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-24895", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24895.json" } ], "title": "CVE-2023-24895" }, { "cve": "CVE-2023-24897", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2023-24897", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24897.json" } ], "title": "CVE-2023-24897" }, { "cve": "CVE-2023-24936", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-24936", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24936.json" } ], "title": "CVE-2023-24936" }, { "cve": "CVE-2023-26552", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2023-26552", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json" } ], "title": "CVE-2023-26552" }, { "cve": "CVE-2023-26553", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2023-26553", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json" } ], "title": "CVE-2023-26553" }, { "cve": "CVE-2023-26554", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2023-26554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json" } ], "title": "CVE-2023-26554" }, { "cve": "CVE-2023-27321", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2023-27321", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27321.json" } ], "title": "CVE-2023-27321" }, { "cve": "CVE-2023-28260", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-28260", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28260.json" } ], "title": "CVE-2023-28260" } ] }
ghsa-gg4c-vq6j-h4hr
Vulnerability from github
handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
{ "affected": [], "aliases": [ "CVE-2022-44793" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-11-07T03:15:00Z", "severity": "MODERATE" }, "details": "handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "id": "GHSA-gg4c-vq6j-h4hr", "modified": "2025-05-05T18:32:28Z", "published": "2022-11-07T12:00:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44793" }, { "type": "WEB", "url": "https://github.com/net-snmp/net-snmp/issues/475" }, { "type": "WEB", "url": "https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20230223-0011" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
suse-su-2023:0068-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for net-snmp", "title": "Title of the patch" }, { "category": "description", "text": "This update for net-snmp fixes the following issues:\n\n- CVE-2022-44793: Fixed a NULL pointer dereference issue that could\n allow a remote attacker with write access to crash the server\n instance (bsc#1205148).\n- CVE-2022-44792: Fixed a NULL pointer dereference issue that could\n allow a remote attacker with write access to crash the server\n instance (bsc#1205150).\n\nOther fixes:\n- Fixed a potential invalid free of memory, and hardened string handling\n against concurrency issues (bsc#1198059).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-68,SUSE-SLE-SDK-12-SP5-2023-68,SUSE-SLE-SERVER-12-SP5-2023-68", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0068-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:0068-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230068-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:0068-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013454.html" }, { "category": "self", "summary": "SUSE Bug 1198059", "url": "https://bugzilla.suse.com/1198059" }, { "category": "self", "summary": "SUSE Bug 1205148", "url": "https://bugzilla.suse.com/1205148" }, { "category": "self", "summary": "SUSE Bug 1205150", "url": "https://bugzilla.suse.com/1205150" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44792 page", "url": "https://www.suse.com/security/cve/CVE-2022-44792/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44793 page", "url": "https://www.suse.com/security/cve/CVE-2022-44793/" } ], "title": "Security update for net-snmp", "tracking": { "current_release_date": "2023-01-11T10:44:24Z", "generator": { "date": "2023-01-11T10:44:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:0068-1", "initial_release_date": "2023-01-11T10:44:24Z", "revision_history": [ { "date": "2023-01-11T10:44:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libsnmp30-5.7.3-11.6.1.aarch64", "product": { "name": "libsnmp30-5.7.3-11.6.1.aarch64", "product_id": "libsnmp30-5.7.3-11.6.1.aarch64" } }, { "category": "product_version", "name": "net-snmp-5.7.3-11.6.1.aarch64", "product": { "name": "net-snmp-5.7.3-11.6.1.aarch64", "product_id": "net-snmp-5.7.3-11.6.1.aarch64" } }, { "category": "product_version", "name": "net-snmp-devel-5.7.3-11.6.1.aarch64", "product": { "name": "net-snmp-devel-5.7.3-11.6.1.aarch64", "product_id": "net-snmp-devel-5.7.3-11.6.1.aarch64" } }, { "category": "product_version", "name": "net-snmp-python-5.7.3-11.6.1.aarch64", "product": { "name": "net-snmp-python-5.7.3-11.6.1.aarch64", "product_id": "net-snmp-python-5.7.3-11.6.1.aarch64" } }, { "category": "product_version", "name": "perl-SNMP-5.7.3-11.6.1.aarch64", "product": { "name": "perl-SNMP-5.7.3-11.6.1.aarch64", "product_id": "perl-SNMP-5.7.3-11.6.1.aarch64" } }, { "category": "product_version", "name": "snmp-mibs-5.7.3-11.6.1.aarch64", "product": { "name": "snmp-mibs-5.7.3-11.6.1.aarch64", "product_id": "snmp-mibs-5.7.3-11.6.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libsnmp30-64bit-5.7.3-11.6.1.aarch64_ilp32", "product": { "name": "libsnmp30-64bit-5.7.3-11.6.1.aarch64_ilp32", "product_id": "libsnmp30-64bit-5.7.3-11.6.1.aarch64_ilp32" } }, { "category": "product_version", "name": "net-snmp-devel-64bit-5.7.3-11.6.1.aarch64_ilp32", "product": { "name": "net-snmp-devel-64bit-5.7.3-11.6.1.aarch64_ilp32", "product_id": "net-snmp-devel-64bit-5.7.3-11.6.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "libsnmp30-5.7.3-11.6.1.i586", "product": { "name": "libsnmp30-5.7.3-11.6.1.i586", "product_id": "libsnmp30-5.7.3-11.6.1.i586" } }, { "category": "product_version", "name": "net-snmp-5.7.3-11.6.1.i586", "product": { "name": "net-snmp-5.7.3-11.6.1.i586", "product_id": "net-snmp-5.7.3-11.6.1.i586" } }, { "category": "product_version", "name": "net-snmp-devel-5.7.3-11.6.1.i586", "product": { "name": "net-snmp-devel-5.7.3-11.6.1.i586", "product_id": "net-snmp-devel-5.7.3-11.6.1.i586" } }, { "category": "product_version", "name": "net-snmp-python-5.7.3-11.6.1.i586", "product": { "name": "net-snmp-python-5.7.3-11.6.1.i586", "product_id": "net-snmp-python-5.7.3-11.6.1.i586" } }, { "category": "product_version", "name": "perl-SNMP-5.7.3-11.6.1.i586", "product": { "name": "perl-SNMP-5.7.3-11.6.1.i586", "product_id": "perl-SNMP-5.7.3-11.6.1.i586" } }, { "category": "product_version", "name": "snmp-mibs-5.7.3-11.6.1.i586", "product": { "name": "snmp-mibs-5.7.3-11.6.1.i586", "product_id": "snmp-mibs-5.7.3-11.6.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libsnmp30-5.7.3-11.6.1.ppc64le", "product": { "name": "libsnmp30-5.7.3-11.6.1.ppc64le", "product_id": "libsnmp30-5.7.3-11.6.1.ppc64le" } }, { "category": "product_version", "name": "net-snmp-5.7.3-11.6.1.ppc64le", "product": { "name": "net-snmp-5.7.3-11.6.1.ppc64le", "product_id": "net-snmp-5.7.3-11.6.1.ppc64le" } }, { "category": "product_version", "name": "net-snmp-devel-5.7.3-11.6.1.ppc64le", "product": { "name": "net-snmp-devel-5.7.3-11.6.1.ppc64le", "product_id": "net-snmp-devel-5.7.3-11.6.1.ppc64le" } }, { "category": "product_version", "name": "net-snmp-python-5.7.3-11.6.1.ppc64le", "product": { "name": "net-snmp-python-5.7.3-11.6.1.ppc64le", "product_id": "net-snmp-python-5.7.3-11.6.1.ppc64le" } }, { "category": "product_version", "name": "perl-SNMP-5.7.3-11.6.1.ppc64le", "product": { "name": "perl-SNMP-5.7.3-11.6.1.ppc64le", "product_id": "perl-SNMP-5.7.3-11.6.1.ppc64le" } }, { "category": "product_version", "name": "snmp-mibs-5.7.3-11.6.1.ppc64le", "product": { "name": "snmp-mibs-5.7.3-11.6.1.ppc64le", "product_id": "snmp-mibs-5.7.3-11.6.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libsnmp30-5.7.3-11.6.1.s390", "product": { "name": "libsnmp30-5.7.3-11.6.1.s390", "product_id": "libsnmp30-5.7.3-11.6.1.s390" } }, { "category": "product_version", "name": "net-snmp-5.7.3-11.6.1.s390", "product": { "name": "net-snmp-5.7.3-11.6.1.s390", "product_id": "net-snmp-5.7.3-11.6.1.s390" } }, { "category": "product_version", "name": "net-snmp-devel-5.7.3-11.6.1.s390", "product": { "name": "net-snmp-devel-5.7.3-11.6.1.s390", "product_id": "net-snmp-devel-5.7.3-11.6.1.s390" } }, { "category": "product_version", "name": "net-snmp-python-5.7.3-11.6.1.s390", "product": { "name": "net-snmp-python-5.7.3-11.6.1.s390", "product_id": "net-snmp-python-5.7.3-11.6.1.s390" } }, { "category": "product_version", "name": "perl-SNMP-5.7.3-11.6.1.s390", "product": { "name": "perl-SNMP-5.7.3-11.6.1.s390", "product_id": "perl-SNMP-5.7.3-11.6.1.s390" } }, { "category": "product_version", "name": "snmp-mibs-5.7.3-11.6.1.s390", "product": { "name": "snmp-mibs-5.7.3-11.6.1.s390", "product_id": "snmp-mibs-5.7.3-11.6.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libsnmp30-5.7.3-11.6.1.s390x", "product": { "name": "libsnmp30-5.7.3-11.6.1.s390x", "product_id": "libsnmp30-5.7.3-11.6.1.s390x" } }, { "category": "product_version", "name": "libsnmp30-32bit-5.7.3-11.6.1.s390x", "product": { "name": "libsnmp30-32bit-5.7.3-11.6.1.s390x", "product_id": "libsnmp30-32bit-5.7.3-11.6.1.s390x" } }, { "category": "product_version", "name": "net-snmp-5.7.3-11.6.1.s390x", "product": { "name": "net-snmp-5.7.3-11.6.1.s390x", "product_id": "net-snmp-5.7.3-11.6.1.s390x" } }, { "category": "product_version", "name": "net-snmp-devel-5.7.3-11.6.1.s390x", "product": { "name": "net-snmp-devel-5.7.3-11.6.1.s390x", "product_id": "net-snmp-devel-5.7.3-11.6.1.s390x" } }, { "category": "product_version", "name": "net-snmp-devel-32bit-5.7.3-11.6.1.s390x", "product": { "name": "net-snmp-devel-32bit-5.7.3-11.6.1.s390x", "product_id": "net-snmp-devel-32bit-5.7.3-11.6.1.s390x" } }, { "category": "product_version", "name": "net-snmp-python-5.7.3-11.6.1.s390x", "product": { "name": "net-snmp-python-5.7.3-11.6.1.s390x", "product_id": "net-snmp-python-5.7.3-11.6.1.s390x" } }, { "category": "product_version", "name": "perl-SNMP-5.7.3-11.6.1.s390x", "product": { "name": "perl-SNMP-5.7.3-11.6.1.s390x", "product_id": "perl-SNMP-5.7.3-11.6.1.s390x" } }, { "category": "product_version", "name": "snmp-mibs-5.7.3-11.6.1.s390x", "product": { "name": "snmp-mibs-5.7.3-11.6.1.s390x", "product_id": "snmp-mibs-5.7.3-11.6.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libsnmp30-5.7.3-11.6.1.x86_64", "product": { "name": "libsnmp30-5.7.3-11.6.1.x86_64", "product_id": "libsnmp30-5.7.3-11.6.1.x86_64" } }, { "category": "product_version", "name": "libsnmp30-32bit-5.7.3-11.6.1.x86_64", "product": { "name": "libsnmp30-32bit-5.7.3-11.6.1.x86_64", "product_id": "libsnmp30-32bit-5.7.3-11.6.1.x86_64" } }, { "category": "product_version", "name": "net-snmp-5.7.3-11.6.1.x86_64", "product": { "name": "net-snmp-5.7.3-11.6.1.x86_64", "product_id": "net-snmp-5.7.3-11.6.1.x86_64" } }, { "category": "product_version", "name": "net-snmp-devel-5.7.3-11.6.1.x86_64", "product": { "name": "net-snmp-devel-5.7.3-11.6.1.x86_64", "product_id": "net-snmp-devel-5.7.3-11.6.1.x86_64" } }, { "category": "product_version", "name": "net-snmp-devel-32bit-5.7.3-11.6.1.x86_64", "product": { "name": "net-snmp-devel-32bit-5.7.3-11.6.1.x86_64", "product_id": "net-snmp-devel-32bit-5.7.3-11.6.1.x86_64" } }, { "category": "product_version", "name": "net-snmp-python-5.7.3-11.6.1.x86_64", "product": { "name": "net-snmp-python-5.7.3-11.6.1.x86_64", "product_id": "net-snmp-python-5.7.3-11.6.1.x86_64" } }, { "category": "product_version", "name": "perl-SNMP-5.7.3-11.6.1.x86_64", "product": { "name": "perl-SNMP-5.7.3-11.6.1.x86_64", "product_id": "perl-SNMP-5.7.3-11.6.1.x86_64" } }, { "category": "product_version", "name": "snmp-mibs-5.7.3-11.6.1.x86_64", "product": { "name": "snmp-mibs-5.7.3-11.6.1.x86_64", "product_id": "snmp-mibs-5.7.3-11.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.7.3-11.6.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.aarch64" }, "product_reference": "net-snmp-devel-5.7.3-11.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.7.3-11.6.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.ppc64le" }, "product_reference": "net-snmp-devel-5.7.3-11.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.7.3-11.6.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.s390x" }, "product_reference": "net-snmp-devel-5.7.3-11.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.7.3-11.6.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.x86_64" }, "product_reference": "net-snmp-devel-5.7.3-11.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp30-5.7.3-11.6.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.aarch64" }, "product_reference": "libsnmp30-5.7.3-11.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp30-5.7.3-11.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.ppc64le" }, "product_reference": "libsnmp30-5.7.3-11.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp30-5.7.3-11.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.s390x" }, "product_reference": "libsnmp30-5.7.3-11.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp30-5.7.3-11.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.x86_64" }, "product_reference": "libsnmp30-5.7.3-11.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp30-32bit-5.7.3-11.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.s390x" }, "product_reference": "libsnmp30-32bit-5.7.3-11.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp30-32bit-5.7.3-11.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.x86_64" }, "product_reference": "libsnmp30-32bit-5.7.3-11.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.7.3-11.6.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.aarch64" }, "product_reference": "net-snmp-5.7.3-11.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.7.3-11.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.ppc64le" }, "product_reference": "net-snmp-5.7.3-11.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.7.3-11.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.s390x" }, "product_reference": "net-snmp-5.7.3-11.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.7.3-11.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.x86_64" }, "product_reference": "net-snmp-5.7.3-11.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.7.3-11.6.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.aarch64" }, "product_reference": "perl-SNMP-5.7.3-11.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.7.3-11.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.ppc64le" }, "product_reference": "perl-SNMP-5.7.3-11.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.7.3-11.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.s390x" }, "product_reference": "perl-SNMP-5.7.3-11.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.7.3-11.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.x86_64" }, "product_reference": "perl-SNMP-5.7.3-11.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.7.3-11.6.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.aarch64" }, "product_reference": "snmp-mibs-5.7.3-11.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.7.3-11.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.ppc64le" }, "product_reference": "snmp-mibs-5.7.3-11.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.7.3-11.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.s390x" }, "product_reference": "snmp-mibs-5.7.3-11.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.7.3-11.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.x86_64" }, "product_reference": "snmp-mibs-5.7.3-11.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp30-5.7.3-11.6.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.aarch64" }, "product_reference": "libsnmp30-5.7.3-11.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp30-5.7.3-11.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.ppc64le" }, "product_reference": "libsnmp30-5.7.3-11.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp30-5.7.3-11.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.s390x" }, "product_reference": "libsnmp30-5.7.3-11.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp30-5.7.3-11.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.x86_64" }, "product_reference": "libsnmp30-5.7.3-11.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp30-32bit-5.7.3-11.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.s390x" }, "product_reference": "libsnmp30-32bit-5.7.3-11.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp30-32bit-5.7.3-11.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.x86_64" }, "product_reference": "libsnmp30-32bit-5.7.3-11.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.7.3-11.6.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.aarch64" }, "product_reference": "net-snmp-5.7.3-11.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.7.3-11.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.ppc64le" }, "product_reference": "net-snmp-5.7.3-11.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.7.3-11.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.s390x" }, "product_reference": "net-snmp-5.7.3-11.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.7.3-11.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.x86_64" }, "product_reference": "net-snmp-5.7.3-11.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.7.3-11.6.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.aarch64" }, "product_reference": "perl-SNMP-5.7.3-11.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.7.3-11.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.ppc64le" }, "product_reference": "perl-SNMP-5.7.3-11.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.7.3-11.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.s390x" }, "product_reference": "perl-SNMP-5.7.3-11.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.7.3-11.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.x86_64" }, "product_reference": "perl-SNMP-5.7.3-11.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.7.3-11.6.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.aarch64" }, "product_reference": "snmp-mibs-5.7.3-11.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.7.3-11.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.ppc64le" }, "product_reference": "snmp-mibs-5.7.3-11.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.7.3-11.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.s390x" }, "product_reference": "snmp-mibs-5.7.3-11.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.7.3-11.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.x86_64" }, "product_reference": "snmp-mibs-5.7.3-11.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-44792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44792" } ], "notes": [ { "category": "general", "text": "handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44792", "url": "https://www.suse.com/security/cve/CVE-2022-44792" }, { "category": "external", "summary": "SUSE Bug 1205150 for CVE-2022-44792", "url": "https://bugzilla.suse.com/1205150" }, { "category": "external", "summary": "SUSE Bug 1207896 for CVE-2022-44792", "url": "https://bugzilla.suse.com/1207896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-01-11T10:44:24Z", "details": "moderate" } ], "title": "CVE-2022-44792" }, { "cve": "CVE-2022-44793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44793" } ], "notes": [ { "category": "general", "text": "handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44793", "url": "https://www.suse.com/security/cve/CVE-2022-44793" }, { "category": "external", "summary": "SUSE Bug 1205148 for CVE-2022-44793", "url": "https://bugzilla.suse.com/1205148" }, { "category": "external", "summary": "SUSE Bug 1207896 for CVE-2022-44793", "url": "https://bugzilla.suse.com/1207896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libsnmp30-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:net-snmp-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:perl-SNMP-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server 12 SP5:snmp-mibs-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-32bit-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libsnmp30-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:net-snmp-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:perl-SNMP-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:snmp-mibs-5.7.3-11.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:net-snmp-devel-5.7.3-11.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-01-11T10:44:24Z", "details": "moderate" } ], "title": "CVE-2022-44793" } ] }
suse-su-2023:0075-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for net-snmp", "title": "Title of the patch" }, { "category": "description", "text": "This update for net-snmp fixes the following issues:\n\n- CVE-2022-44793: Fixed a NULL pointer dereference issue that could\n allow a remote attacker with write access to crash the server\n instance (bsc#1205148).\n- CVE-2022-44792: Fixed a NULL pointer dereference issue that could\n allow a remote attacker with write access to crash the server\n instance (bsc#1205150).\n\nOther fixes:\n- Enabled AES-192 and AES-256 privacy protocols (bsc#1206828).\n- Fixed an incorrect systemd hardening that caused home directory\n size and allocation to be listed incorrectly (bsc#1206044)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-75,SUSE-SLE-Micro-5.3-2023-75,SUSE-SLE-Module-Basesystem-15-SP4-2023-75,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-75,SUSE-SLE-Product-RT-15-SP3-2023-75,openSUSE-Leap-Micro-5.3-2023-75,openSUSE-SLE-15.4-2023-75", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0075-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:0075-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230075-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:0075-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013464.html" }, { "category": "self", "summary": "SUSE Bug 1205148", "url": "https://bugzilla.suse.com/1205148" }, { "category": "self", "summary": "SUSE Bug 1205150", "url": "https://bugzilla.suse.com/1205150" }, { "category": "self", "summary": "SUSE Bug 1206044", "url": "https://bugzilla.suse.com/1206044" }, { "category": "self", "summary": "SUSE Bug 1206828", "url": "https://bugzilla.suse.com/1206828" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44792 page", "url": "https://www.suse.com/security/cve/CVE-2022-44792/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44793 page", "url": "https://www.suse.com/security/cve/CVE-2022-44793/" } ], "title": "Security update for net-snmp", "tracking": { "current_release_date": "2023-01-12T08:03:30Z", "generator": { "date": "2023-01-12T08:03:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:0075-1", "initial_release_date": "2023-01-12T08:03:30Z", "revision_history": [ { "date": "2023-01-12T08:03:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libsnmp40-5.9.3-150300.15.8.1.aarch64", "product": { "name": "libsnmp40-5.9.3-150300.15.8.1.aarch64", "product_id": "libsnmp40-5.9.3-150300.15.8.1.aarch64" } }, { "category": "product_version", "name": "net-snmp-5.9.3-150300.15.8.1.aarch64", "product": { "name": "net-snmp-5.9.3-150300.15.8.1.aarch64", "product_id": "net-snmp-5.9.3-150300.15.8.1.aarch64" } }, { "category": "product_version", "name": "net-snmp-devel-5.9.3-150300.15.8.1.aarch64", "product": { "name": "net-snmp-devel-5.9.3-150300.15.8.1.aarch64", "product_id": "net-snmp-devel-5.9.3-150300.15.8.1.aarch64" } }, { "category": "product_version", "name": "perl-SNMP-5.9.3-150300.15.8.1.aarch64", "product": { "name": "perl-SNMP-5.9.3-150300.15.8.1.aarch64", "product_id": "perl-SNMP-5.9.3-150300.15.8.1.aarch64" } }, { "category": "product_version", "name": "python2-net-snmp-5.9.3-150300.15.8.1.aarch64", "product": { "name": "python2-net-snmp-5.9.3-150300.15.8.1.aarch64", "product_id": "python2-net-snmp-5.9.3-150300.15.8.1.aarch64" } }, { "category": "product_version", "name": "python3-net-snmp-5.9.3-150300.15.8.1.aarch64", "product": { "name": "python3-net-snmp-5.9.3-150300.15.8.1.aarch64", "product_id": "python3-net-snmp-5.9.3-150300.15.8.1.aarch64" } }, { "category": "product_version", "name": "snmp-mibs-5.9.3-150300.15.8.1.aarch64", "product": { "name": "snmp-mibs-5.9.3-150300.15.8.1.aarch64", "product_id": "snmp-mibs-5.9.3-150300.15.8.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libsnmp40-64bit-5.9.3-150300.15.8.1.aarch64_ilp32", "product": { "name": "libsnmp40-64bit-5.9.3-150300.15.8.1.aarch64_ilp32", "product_id": "libsnmp40-64bit-5.9.3-150300.15.8.1.aarch64_ilp32" } }, { "category": "product_version", "name": "net-snmp-devel-64bit-5.9.3-150300.15.8.1.aarch64_ilp32", "product": { "name": "net-snmp-devel-64bit-5.9.3-150300.15.8.1.aarch64_ilp32", "product_id": "net-snmp-devel-64bit-5.9.3-150300.15.8.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "libsnmp40-5.9.3-150300.15.8.1.i586", "product": { "name": "libsnmp40-5.9.3-150300.15.8.1.i586", "product_id": "libsnmp40-5.9.3-150300.15.8.1.i586" } }, { "category": "product_version", "name": "net-snmp-5.9.3-150300.15.8.1.i586", "product": { "name": "net-snmp-5.9.3-150300.15.8.1.i586", "product_id": "net-snmp-5.9.3-150300.15.8.1.i586" } }, { "category": "product_version", "name": "net-snmp-devel-5.9.3-150300.15.8.1.i586", "product": { "name": "net-snmp-devel-5.9.3-150300.15.8.1.i586", "product_id": "net-snmp-devel-5.9.3-150300.15.8.1.i586" } }, { "category": "product_version", "name": "perl-SNMP-5.9.3-150300.15.8.1.i586", "product": { "name": "perl-SNMP-5.9.3-150300.15.8.1.i586", "product_id": "perl-SNMP-5.9.3-150300.15.8.1.i586" } }, { "category": "product_version", "name": "python2-net-snmp-5.9.3-150300.15.8.1.i586", "product": { "name": "python2-net-snmp-5.9.3-150300.15.8.1.i586", "product_id": "python2-net-snmp-5.9.3-150300.15.8.1.i586" } }, { "category": "product_version", "name": "python3-net-snmp-5.9.3-150300.15.8.1.i586", "product": { "name": "python3-net-snmp-5.9.3-150300.15.8.1.i586", "product_id": "python3-net-snmp-5.9.3-150300.15.8.1.i586" } }, { "category": "product_version", "name": "snmp-mibs-5.9.3-150300.15.8.1.i586", "product": { "name": "snmp-mibs-5.9.3-150300.15.8.1.i586", "product_id": "snmp-mibs-5.9.3-150300.15.8.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libsnmp40-5.9.3-150300.15.8.1.ppc64le", "product": { "name": "libsnmp40-5.9.3-150300.15.8.1.ppc64le", "product_id": "libsnmp40-5.9.3-150300.15.8.1.ppc64le" } }, { "category": "product_version", "name": "net-snmp-5.9.3-150300.15.8.1.ppc64le", "product": { "name": "net-snmp-5.9.3-150300.15.8.1.ppc64le", "product_id": "net-snmp-5.9.3-150300.15.8.1.ppc64le" } }, { "category": "product_version", "name": "net-snmp-devel-5.9.3-150300.15.8.1.ppc64le", "product": { "name": "net-snmp-devel-5.9.3-150300.15.8.1.ppc64le", "product_id": "net-snmp-devel-5.9.3-150300.15.8.1.ppc64le" } }, { "category": "product_version", "name": "perl-SNMP-5.9.3-150300.15.8.1.ppc64le", "product": { "name": "perl-SNMP-5.9.3-150300.15.8.1.ppc64le", "product_id": "perl-SNMP-5.9.3-150300.15.8.1.ppc64le" } }, { "category": "product_version", "name": "python2-net-snmp-5.9.3-150300.15.8.1.ppc64le", "product": { "name": "python2-net-snmp-5.9.3-150300.15.8.1.ppc64le", "product_id": "python2-net-snmp-5.9.3-150300.15.8.1.ppc64le" } }, { "category": "product_version", "name": "python3-net-snmp-5.9.3-150300.15.8.1.ppc64le", "product": { "name": "python3-net-snmp-5.9.3-150300.15.8.1.ppc64le", "product_id": "python3-net-snmp-5.9.3-150300.15.8.1.ppc64le" } }, { "category": "product_version", "name": "snmp-mibs-5.9.3-150300.15.8.1.ppc64le", "product": { "name": "snmp-mibs-5.9.3-150300.15.8.1.ppc64le", "product_id": "snmp-mibs-5.9.3-150300.15.8.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libsnmp40-5.9.3-150300.15.8.1.s390x", "product": { "name": "libsnmp40-5.9.3-150300.15.8.1.s390x", "product_id": "libsnmp40-5.9.3-150300.15.8.1.s390x" } }, { "category": "product_version", "name": "net-snmp-5.9.3-150300.15.8.1.s390x", "product": { "name": "net-snmp-5.9.3-150300.15.8.1.s390x", "product_id": "net-snmp-5.9.3-150300.15.8.1.s390x" } }, { "category": "product_version", "name": "net-snmp-devel-5.9.3-150300.15.8.1.s390x", "product": { "name": "net-snmp-devel-5.9.3-150300.15.8.1.s390x", "product_id": "net-snmp-devel-5.9.3-150300.15.8.1.s390x" } }, { "category": "product_version", "name": "perl-SNMP-5.9.3-150300.15.8.1.s390x", "product": { "name": "perl-SNMP-5.9.3-150300.15.8.1.s390x", "product_id": "perl-SNMP-5.9.3-150300.15.8.1.s390x" } }, { "category": "product_version", "name": "python2-net-snmp-5.9.3-150300.15.8.1.s390x", "product": { "name": "python2-net-snmp-5.9.3-150300.15.8.1.s390x", "product_id": "python2-net-snmp-5.9.3-150300.15.8.1.s390x" } }, { "category": "product_version", "name": "python3-net-snmp-5.9.3-150300.15.8.1.s390x", "product": { "name": "python3-net-snmp-5.9.3-150300.15.8.1.s390x", "product_id": "python3-net-snmp-5.9.3-150300.15.8.1.s390x" } }, { "category": "product_version", "name": "snmp-mibs-5.9.3-150300.15.8.1.s390x", "product": { "name": "snmp-mibs-5.9.3-150300.15.8.1.s390x", "product_id": "snmp-mibs-5.9.3-150300.15.8.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libsnmp40-5.9.3-150300.15.8.1.x86_64", "product": { "name": "libsnmp40-5.9.3-150300.15.8.1.x86_64", "product_id": "libsnmp40-5.9.3-150300.15.8.1.x86_64" } }, { "category": "product_version", "name": "libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64", "product": { "name": "libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64", "product_id": "libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64" } }, { "category": "product_version", "name": "net-snmp-5.9.3-150300.15.8.1.x86_64", "product": { "name": "net-snmp-5.9.3-150300.15.8.1.x86_64", "product_id": "net-snmp-5.9.3-150300.15.8.1.x86_64" } }, { "category": "product_version", "name": "net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "product": { "name": "net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "product_id": "net-snmp-devel-5.9.3-150300.15.8.1.x86_64" } }, { "category": "product_version", "name": "net-snmp-devel-32bit-5.9.3-150300.15.8.1.x86_64", "product": { "name": "net-snmp-devel-32bit-5.9.3-150300.15.8.1.x86_64", "product_id": "net-snmp-devel-32bit-5.9.3-150300.15.8.1.x86_64" } }, { "category": "product_version", "name": "perl-SNMP-5.9.3-150300.15.8.1.x86_64", "product": { "name": "perl-SNMP-5.9.3-150300.15.8.1.x86_64", "product_id": "perl-SNMP-5.9.3-150300.15.8.1.x86_64" } }, { "category": "product_version", "name": "python2-net-snmp-5.9.3-150300.15.8.1.x86_64", "product": { "name": "python2-net-snmp-5.9.3-150300.15.8.1.x86_64", "product_id": "python2-net-snmp-5.9.3-150300.15.8.1.x86_64" } }, { "category": "product_version", "name": "python3-net-snmp-5.9.3-150300.15.8.1.x86_64", "product": { "name": "python3-net-snmp-5.9.3-150300.15.8.1.x86_64", "product_id": "python3-net-snmp-5.9.3-150300.15.8.1.x86_64" } }, { "category": "product_version", "name": "snmp-mibs-5.9.3-150300.15.8.1.x86_64", "product": { "name": "snmp-mibs-5.9.3-150300.15.8.1.x86_64", "product_id": "snmp-mibs-5.9.3-150300.15.8.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Package Hub 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 15 SP3", "product": { "name": "SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_rt:15:sp3" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.3", "product": { "name": "openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-150300.15.8.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.aarch64" }, "product_reference": "libsnmp40-5.9.3-150300.15.8.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-150300.15.8.1.s390x as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.s390x" }, "product_reference": "libsnmp40-5.9.3-150300.15.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-150300.15.8.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "libsnmp40-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-150300.15.8.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.aarch64" }, "product_reference": "snmp-mibs-5.9.3-150300.15.8.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-150300.15.8.1.s390x as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.s390x" }, "product_reference": "snmp-mibs-5.9.3-150300.15.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-150300.15.8.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "snmp-mibs-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-150300.15.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.aarch64" }, "product_reference": "libsnmp40-5.9.3-150300.15.8.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-150300.15.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.ppc64le" }, "product_reference": "libsnmp40-5.9.3-150300.15.8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-150300.15.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.s390x" }, "product_reference": "libsnmp40-5.9.3-150300.15.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-150300.15.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "libsnmp40-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.9.3-150300.15.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.aarch64" }, "product_reference": "net-snmp-5.9.3-150300.15.8.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.9.3-150300.15.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.ppc64le" }, "product_reference": "net-snmp-5.9.3-150300.15.8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.9.3-150300.15.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.s390x" }, "product_reference": "net-snmp-5.9.3-150300.15.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.9.3-150300.15.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "net-snmp-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.9.3-150300.15.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.aarch64" }, "product_reference": "net-snmp-devel-5.9.3-150300.15.8.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.9.3-150300.15.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.ppc64le" }, "product_reference": "net-snmp-devel-5.9.3-150300.15.8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.9.3-150300.15.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.s390x" }, "product_reference": "net-snmp-devel-5.9.3-150300.15.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.9.3-150300.15.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.9.3-150300.15.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.aarch64" }, "product_reference": "perl-SNMP-5.9.3-150300.15.8.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.9.3-150300.15.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.ppc64le" }, "product_reference": "perl-SNMP-5.9.3-150300.15.8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.9.3-150300.15.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.s390x" }, "product_reference": "perl-SNMP-5.9.3-150300.15.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.9.3-150300.15.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "perl-SNMP-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-150300.15.8.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.aarch64" }, "product_reference": "snmp-mibs-5.9.3-150300.15.8.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-150300.15.8.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.ppc64le" }, "product_reference": "snmp-mibs-5.9.3-150300.15.8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-150300.15.8.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.s390x" }, "product_reference": "snmp-mibs-5.9.3-150300.15.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-150300.15.8.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "snmp-mibs-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-150300.15.8.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:libsnmp40-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "libsnmp40-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.9.3-150300.15.8.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:net-snmp-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "net-snmp-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.9.3-150300.15.8.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:net-snmp-devel-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.9.3-150300.15.8.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:perl-SNMP-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "perl-SNMP-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-150300.15.8.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:snmp-mibs-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "snmp-mibs-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-150300.15.8.1.aarch64 as component of openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.aarch64" }, "product_reference": "libsnmp40-5.9.3-150300.15.8.1.aarch64", "relates_to_product_reference": "openSUSE Leap Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-150300.15.8.1.x86_64 as component of openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "libsnmp40-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-150300.15.8.1.aarch64 as component of openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.aarch64" }, "product_reference": "snmp-mibs-5.9.3-150300.15.8.1.aarch64", "relates_to_product_reference": "openSUSE Leap Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-150300.15.8.1.x86_64 as component of openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "snmp-mibs-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-150300.15.8.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.aarch64" }, "product_reference": "libsnmp40-5.9.3-150300.15.8.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-150300.15.8.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.ppc64le" }, "product_reference": "libsnmp40-5.9.3-150300.15.8.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-150300.15.8.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.s390x" }, "product_reference": "libsnmp40-5.9.3-150300.15.8.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-5.9.3-150300.15.8.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "libsnmp40-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.9.3-150300.15.8.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.aarch64" }, "product_reference": "net-snmp-5.9.3-150300.15.8.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.9.3-150300.15.8.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.ppc64le" }, "product_reference": "net-snmp-5.9.3-150300.15.8.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.9.3-150300.15.8.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.s390x" }, "product_reference": "net-snmp-5.9.3-150300.15.8.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-5.9.3-150300.15.8.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "net-snmp-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.9.3-150300.15.8.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.aarch64" }, "product_reference": "net-snmp-devel-5.9.3-150300.15.8.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.9.3-150300.15.8.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.ppc64le" }, "product_reference": "net-snmp-devel-5.9.3-150300.15.8.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.9.3-150300.15.8.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.s390x" }, "product_reference": "net-snmp-devel-5.9.3-150300.15.8.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-5.9.3-150300.15.8.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-32bit-5.9.3-150300.15.8.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "net-snmp-devel-32bit-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.9.3-150300.15.8.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.aarch64" }, "product_reference": "perl-SNMP-5.9.3-150300.15.8.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.9.3-150300.15.8.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.ppc64le" }, "product_reference": "perl-SNMP-5.9.3-150300.15.8.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.9.3-150300.15.8.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.s390x" }, "product_reference": "perl-SNMP-5.9.3-150300.15.8.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "perl-SNMP-5.9.3-150300.15.8.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "perl-SNMP-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-5.9.3-150300.15.8.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.aarch64" }, "product_reference": "python3-net-snmp-5.9.3-150300.15.8.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-5.9.3-150300.15.8.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.ppc64le" }, "product_reference": "python3-net-snmp-5.9.3-150300.15.8.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-5.9.3-150300.15.8.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.s390x" }, "product_reference": "python3-net-snmp-5.9.3-150300.15.8.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-net-snmp-5.9.3-150300.15.8.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "python3-net-snmp-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-150300.15.8.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.aarch64" }, "product_reference": "snmp-mibs-5.9.3-150300.15.8.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-150300.15.8.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.ppc64le" }, "product_reference": "snmp-mibs-5.9.3-150300.15.8.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-150300.15.8.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.s390x" }, "product_reference": "snmp-mibs-5.9.3-150300.15.8.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "snmp-mibs-5.9.3-150300.15.8.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.x86_64" }, "product_reference": "snmp-mibs-5.9.3-150300.15.8.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-44792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44792" } ], "notes": [ { "category": "general", "text": "handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:net-snmp-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44792", "url": "https://www.suse.com/security/cve/CVE-2022-44792" }, { "category": "external", "summary": "SUSE Bug 1205150 for CVE-2022-44792", "url": "https://bugzilla.suse.com/1205150" }, { "category": "external", "summary": "SUSE Bug 1207896 for CVE-2022-44792", "url": "https://bugzilla.suse.com/1207896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:net-snmp-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:net-snmp-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-01-12T08:03:30Z", "details": "moderate" } ], "title": "CVE-2022-44792" }, { "cve": "CVE-2022-44793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44793" } ], "notes": [ { "category": "general", "text": "handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:net-snmp-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44793", "url": "https://www.suse.com/security/cve/CVE-2022-44793" }, { "category": "external", "summary": "SUSE Bug 1205148 for CVE-2022-44793", "url": "https://bugzilla.suse.com/1205148" }, { "category": "external", "summary": "SUSE Bug 1207896 for CVE-2022-44793", "url": "https://bugzilla.suse.com/1207896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:net-snmp-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:net-snmp-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:libsnmp40-32bit-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:libsnmp40-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:net-snmp-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-devel-32bit-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:net-snmp-devel-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:perl-SNMP-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:python3-net-snmp-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.ppc64le", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.s390x", "openSUSE Leap 15.4:snmp-mibs-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap Micro 5.3:libsnmp40-5.9.3-150300.15.8.1.x86_64", "openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.aarch64", "openSUSE Leap Micro 5.3:snmp-mibs-5.9.3-150300.15.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-01-12T08:03:30Z", "details": "moderate" } ], "title": "CVE-2022-44793" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.